2016-02-24 14:01:19 +00:00
|
|
|
|
import json
|
2021-03-11 20:26:44 +00:00
|
|
|
|
import uuid
|
2023-12-08 21:43:52 -05:00
|
|
|
|
from functools import partial
|
2021-03-10 13:55:06 +00:00
|
|
|
|
|
2017-12-20 14:38:49 +00:00
|
|
|
|
import pytest
|
2020-09-15 16:45:24 +01:00
|
|
|
|
from flask import current_app
|
2021-03-11 20:26:44 +00:00
|
|
|
|
from freezegun import freeze_time
|
2024-11-15 12:30:58 -08:00
|
|
|
|
from sqlalchemy import select
|
2016-02-24 14:01:19 +00:00
|
|
|
|
|
2024-11-15 12:30:58 -08:00
|
|
|
|
from app import db
|
2024-02-21 13:47:04 -05:00
|
|
|
|
from app.enums import AuthType, InvitedUserStatus
|
2024-01-16 15:12:57 -05:00
|
|
|
|
from app.models import Notification
|
2024-05-16 10:17:45 -04:00
|
|
|
|
from notifications_utils.url_safe_token import generate_token
|
2021-08-04 15:12:09 +01:00
|
|
|
|
from tests import create_admin_authorization_header
|
2019-10-31 15:02:30 +00:00
|
|
|
|
from tests.app.db import create_invited_user
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
|
|
"extra_args, expected_start_of_invite_url",
|
|
|
|
|
|
[
|
|
|
|
|
|
({}, "http://localhost:6012/invitation/"),
|
|
|
|
|
|
(
|
|
|
|
|
|
{"invite_link_host": "https://www.example.com"},
|
|
|
|
|
|
"https://www.example.com/invitation/",
|
|
|
|
|
|
),
|
|
|
|
|
|
],
|
|
|
|
|
|
)
|
2017-12-20 14:38:49 +00:00
|
|
|
|
def test_create_invited_user(
|
|
|
|
|
|
admin_request,
|
|
|
|
|
|
sample_service,
|
|
|
|
|
|
mocker,
|
|
|
|
|
|
invitation_email_template,
|
|
|
|
|
|
extra_args,
|
|
|
|
|
|
expected_start_of_invite_url,
|
|
|
|
|
|
):
|
2024-06-20 13:30:43 -07:00
|
|
|
|
mocker.patch("app.service_invite.rest.redis_store.set")
|
|
|
|
|
|
mocker.patch("app.service_invite.rest.redis_store.get")
|
2024-04-19 10:33:26 -07:00
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
mocked = mocker.patch("app.celery.provider_tasks.deliver_email.apply_async")
|
|
|
|
|
|
email_address = "invited_user@service.gov.uk"
|
2016-12-20 15:59:31 +00:00
|
|
|
|
invite_from = sample_service.users[0]
|
|
|
|
|
|
|
2017-12-20 14:38:49 +00:00
|
|
|
|
data = dict(
|
|
|
|
|
|
service=str(sample_service.id),
|
|
|
|
|
|
email_address=email_address,
|
|
|
|
|
|
from_user=str(invite_from.id),
|
2023-08-29 14:54:30 -07:00
|
|
|
|
permissions="send_messages,manage_service,manage_api_keys",
|
2024-01-16 15:12:57 -05:00
|
|
|
|
auth_type=AuthType.EMAIL,
|
2023-08-29 14:54:30 -07:00
|
|
|
|
folder_permissions=["folder_1", "folder_2", "folder_3"],
|
2024-10-21 16:37:31 -04:00
|
|
|
|
nonce="FakeNonce",
|
2024-11-01 12:12:30 -04:00
|
|
|
|
state="FakeState",
|
2023-11-10 16:14:03 -05:00
|
|
|
|
**extra_args,
|
2017-12-20 14:38:49 +00:00
|
|
|
|
)
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
2017-10-30 11:53:55 +00:00
|
|
|
|
json_resp = admin_request.post(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service_invite.create_invited_user",
|
2017-10-30 11:53:55 +00:00
|
|
|
|
service_id=sample_service.id,
|
|
|
|
|
|
_data=data,
|
2023-08-29 14:54:30 -07:00
|
|
|
|
_expected_status=201,
|
2016-12-20 15:59:31 +00:00
|
|
|
|
)
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["data"]["service"] == str(sample_service.id)
|
|
|
|
|
|
assert json_resp["data"]["email_address"] == email_address
|
|
|
|
|
|
assert json_resp["data"]["from_user"] == str(invite_from.id)
|
|
|
|
|
|
assert (
|
|
|
|
|
|
json_resp["data"]["permissions"]
|
|
|
|
|
|
== "send_messages,manage_service,manage_api_keys"
|
|
|
|
|
|
)
|
2024-01-16 15:12:57 -05:00
|
|
|
|
assert json_resp["data"]["auth_type"] == AuthType.EMAIL
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["data"]["id"]
|
|
|
|
|
|
assert json_resp["data"]["folder_permissions"] == [
|
|
|
|
|
|
"folder_1",
|
|
|
|
|
|
"folder_2",
|
|
|
|
|
|
"folder_3",
|
|
|
|
|
|
]
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
2024-11-15 12:30:58 -08:00
|
|
|
|
notification = db.session.execute(select(Notification)).scalars().first()
|
2017-12-20 14:38:49 +00:00
|
|
|
|
|
2017-12-18 11:39:21 +00:00
|
|
|
|
assert notification.reply_to_text == invite_from.email_address
|
2017-12-20 14:38:49 +00:00
|
|
|
|
|
2024-01-22 10:55:09 -08:00
|
|
|
|
# As part of notify-api-749 we are removing personalisation from the db
|
|
|
|
|
|
# The personalisation should have been sent in the notification (see the service_invite code)
|
|
|
|
|
|
# it is just not stored in the db.
|
|
|
|
|
|
# assert len(notification.personalisation.keys()) == 3
|
|
|
|
|
|
# assert notification.personalisation["service_name"] == "Sample service"
|
|
|
|
|
|
# assert notification.personalisation["user_name"] == "Test User"
|
|
|
|
|
|
# assert notification.personalisation["url"].startswith(expected_start_of_invite_url)
|
|
|
|
|
|
# assert len(notification.personalisation["url"]) > len(expected_start_of_invite_url)
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert (
|
|
|
|
|
|
str(notification.template_id)
|
|
|
|
|
|
== current_app.config["INVITATION_EMAIL_TEMPLATE_ID"]
|
|
|
|
|
|
)
|
2020-09-15 16:45:24 +01:00
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
mocked.assert_called_once_with(
|
2025-04-15 11:36:09 -07:00
|
|
|
|
[str(notification.id)], queue="notify-internal-tasks", countdown=60
|
2023-08-29 14:54:30 -07:00
|
|
|
|
)
|
2020-09-15 16:45:24 +01:00
|
|
|
|
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
def test_create_invited_user_without_auth_type(
|
|
|
|
|
|
admin_request, sample_service, mocker, invitation_email_template
|
|
|
|
|
|
):
|
2024-04-19 10:33:26 -07:00
|
|
|
|
|
2024-06-20 11:55:01 -07:00
|
|
|
|
mocker.patch("app.service_invite.rest.redis_store.set")
|
|
|
|
|
|
mocker.patch("app.service_invite.rest.redis_store.get")
|
2023-08-29 14:54:30 -07:00
|
|
|
|
mocker.patch("app.celery.provider_tasks.deliver_email.apply_async")
|
|
|
|
|
|
email_address = "invited_user@service.gov.uk"
|
2017-10-30 11:53:55 +00:00
|
|
|
|
invite_from = sample_service.users[0]
|
|
|
|
|
|
|
|
|
|
|
|
data = {
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service": str(sample_service.id),
|
|
|
|
|
|
"email_address": email_address,
|
|
|
|
|
|
"from_user": str(invite_from.id),
|
|
|
|
|
|
"permissions": "send_messages,manage_service,manage_api_keys",
|
|
|
|
|
|
"folder_permissions": [],
|
2024-10-21 16:37:31 -04:00
|
|
|
|
"nonce": "FakeNonce",
|
2024-11-01 12:12:30 -04:00
|
|
|
|
"state": "FakeState",
|
2017-10-30 11:53:55 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
json_resp = admin_request.post(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service_invite.create_invited_user",
|
2017-10-30 11:53:55 +00:00
|
|
|
|
service_id=sample_service.id,
|
|
|
|
|
|
_data=data,
|
2023-08-29 14:54:30 -07:00
|
|
|
|
_expected_status=201,
|
2017-10-30 11:53:55 +00:00
|
|
|
|
)
|
|
|
|
|
|
|
2024-01-16 15:12:57 -05:00
|
|
|
|
assert json_resp["data"]["auth_type"] == AuthType.SMS
|
2017-10-30 11:53:55 +00:00
|
|
|
|
|
|
|
|
|
|
|
2019-03-11 14:33:51 +00:00
|
|
|
|
def test_create_invited_user_invalid_email(client, sample_service, mocker, fake_uuid):
|
2023-08-29 14:54:30 -07:00
|
|
|
|
mocked = mocker.patch("app.celery.provider_tasks.deliver_email.apply_async")
|
|
|
|
|
|
email_address = "notanemail"
|
2016-12-20 15:59:31 +00:00
|
|
|
|
invite_from = sample_service.users[0]
|
|
|
|
|
|
|
|
|
|
|
|
data = {
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service": str(sample_service.id),
|
|
|
|
|
|
"email_address": email_address,
|
|
|
|
|
|
"from_user": str(invite_from.id),
|
|
|
|
|
|
"permissions": "send_messages,manage_service,manage_api_keys",
|
|
|
|
|
|
"folder_permissions": [fake_uuid, fake_uuid],
|
2024-10-21 16:37:31 -04:00
|
|
|
|
"nonce": "FakeNonce",
|
2024-11-01 12:12:30 -04:00
|
|
|
|
"state": "FakeState",
|
2016-12-20 15:59:31 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
data = json.dumps(data)
|
|
|
|
|
|
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
|
|
|
|
|
response = client.post(
|
2023-11-10 16:14:03 -05:00
|
|
|
|
f"/service/{sample_service.id}/invite",
|
2023-08-29 14:54:30 -07:00
|
|
|
|
headers=[("Content-Type", "application/json"), auth_header],
|
|
|
|
|
|
data=data,
|
2016-12-20 15:59:31 +00:00
|
|
|
|
)
|
|
|
|
|
|
assert response.status_code == 400
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["result"] == "error"
|
|
|
|
|
|
assert json_resp["message"] == {"email_address": ["Not a valid email address"]}
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert mocked.call_count == 0
|
|
|
|
|
|
|
|
|
|
|
|
|
2022-05-03 17:00:51 +01:00
|
|
|
|
def test_get_all_invited_users_by_service(client, notify_db_session, sample_service):
|
2016-02-25 11:22:36 +00:00
|
|
|
|
invites = []
|
|
|
|
|
|
for i in range(0, 5):
|
2023-12-07 16:26:25 -05:00
|
|
|
|
email = f"invited_user_{i}@service.gov.uk"
|
2019-10-31 15:02:30 +00:00
|
|
|
|
invited_user = create_invited_user(sample_service, to_email_address=email)
|
2016-02-25 11:22:36 +00:00
|
|
|
|
invites.append(invited_user)
|
|
|
|
|
|
|
2023-11-10 16:14:03 -05:00
|
|
|
|
url = f"/service/{sample_service.id}/invite"
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.get(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
url, headers=[("Content-Type", "application/json"), auth_header]
|
2016-12-20 15:59:31 +00:00
|
|
|
|
)
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
invite_from = sample_service.users[0]
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
for invite in json_resp["data"]:
|
|
|
|
|
|
assert invite["service"] == str(sample_service.id)
|
|
|
|
|
|
assert invite["from_user"] == str(invite_from.id)
|
2024-01-16 15:12:57 -05:00
|
|
|
|
assert invite["auth_type"] == AuthType.SMS
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert invite["id"]
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
def test_get_invited_users_by_service_with_no_invites(
|
|
|
|
|
|
client, notify_db_session, sample_service
|
|
|
|
|
|
):
|
2023-11-10 16:14:03 -05:00
|
|
|
|
url = f"/service/{sample_service.id}/invite"
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.get(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
url, headers=[("Content-Type", "application/json"), auth_header]
|
2016-12-20 15:59:31 +00:00
|
|
|
|
)
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert len(json_resp["data"]) == 0
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
2020-08-17 11:59:55 +01:00
|
|
|
|
def test_get_invited_user_by_service(admin_request, sample_invited_user):
|
|
|
|
|
|
json_resp = admin_request.get(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service_invite.get_invited_user_by_service",
|
2020-08-17 11:59:55 +01:00
|
|
|
|
service_id=sample_invited_user.service.id,
|
2023-08-29 14:54:30 -07:00
|
|
|
|
invited_user_id=sample_invited_user.id,
|
2020-08-17 11:59:55 +01:00
|
|
|
|
)
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["data"]["email_address"] == sample_invited_user.email_address
|
2020-08-17 11:59:55 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_get_invited_user_by_service_when_user_does_not_belong_to_the_service(
|
|
|
|
|
|
admin_request,
|
|
|
|
|
|
sample_invited_user,
|
|
|
|
|
|
fake_uuid,
|
|
|
|
|
|
):
|
|
|
|
|
|
json_resp = admin_request.get(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service_invite.get_invited_user_by_service",
|
2020-08-17 11:59:55 +01:00
|
|
|
|
service_id=fake_uuid,
|
|
|
|
|
|
invited_user_id=sample_invited_user.id,
|
2023-08-29 14:54:30 -07:00
|
|
|
|
_expected_status=404,
|
2020-08-17 11:59:55 +01:00
|
|
|
|
)
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["result"] == "error"
|
2020-08-17 11:59:55 +01:00
|
|
|
|
|
|
|
|
|
|
|
2023-12-15 13:14:53 -05:00
|
|
|
|
def test_resend_expired_invite(
|
|
|
|
|
|
client,
|
|
|
|
|
|
sample_expired_user,
|
|
|
|
|
|
invitation_email_template,
|
|
|
|
|
|
mocker,
|
|
|
|
|
|
):
|
2024-04-19 10:33:26 -07:00
|
|
|
|
|
2024-06-20 11:55:01 -07:00
|
|
|
|
mocker.patch("app.service_invite.rest.redis_store.set")
|
|
|
|
|
|
mocker.patch("app.service_invite.rest.redis_store.get")
|
2023-12-13 10:14:14 -05:00
|
|
|
|
url = f"/service/{sample_expired_user.service_id}/invite/{sample_expired_user.id}/resend"
|
2023-12-08 13:15:40 -05:00
|
|
|
|
mock_send = mocker.patch("app.service_invite.rest.send_notification_to_queue")
|
|
|
|
|
|
mock_persist = mocker.patch("app.service_invite.rest.persist_notification")
|
|
|
|
|
|
from app.notifications.process_notifications import persist_notification
|
2023-12-08 21:43:52 -05:00
|
|
|
|
|
2023-12-08 13:15:40 -05:00
|
|
|
|
mock_persist.side_effect = partial(persist_notification, simulated=True)
|
2023-12-07 16:26:25 -05:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
|
|
|
|
|
response = client.post(
|
|
|
|
|
|
url,
|
|
|
|
|
|
headers=[("Content-Type", "application/json"), auth_header],
|
2024-11-01 12:12:30 -04:00
|
|
|
|
data='{"nonce": "FakeNonce", "state": "FakeState"}',
|
2023-12-07 16:26:25 -05:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))["data"]
|
2024-02-21 13:47:04 -05:00
|
|
|
|
assert json_resp["status"] == InvitedUserStatus.PENDING
|
2023-12-08 21:41:56 -05:00
|
|
|
|
assert mock_send.called
|
2023-12-07 16:26:25 -05:00
|
|
|
|
|
|
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
def test_update_invited_user_set_status_to_cancelled(client, sample_invited_user):
|
2024-02-21 14:50:36 -05:00
|
|
|
|
data = {"status": InvitedUserStatus.CANCELLED}
|
2023-12-07 16:26:25 -05:00
|
|
|
|
url = f"/service/{sample_invited_user.service_id}/invite/{sample_invited_user.id}"
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.post(
|
|
|
|
|
|
url,
|
|
|
|
|
|
data=json.dumps(data),
|
|
|
|
|
|
headers=[("Content-Type", "application/json"), auth_header],
|
|
|
|
|
|
)
|
2016-03-01 13:33:20 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert response.status_code == 200
|
2023-08-29 14:54:30 -07:00
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))["data"]
|
2024-02-21 13:47:04 -05:00
|
|
|
|
assert json_resp["status"] == InvitedUserStatus.CANCELLED
|
2016-03-01 13:33:20 +00:00
|
|
|
|
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
def test_update_invited_user_for_wrong_service_returns_404(
|
|
|
|
|
|
client, sample_invited_user, fake_uuid
|
|
|
|
|
|
):
|
2024-02-21 14:50:36 -05:00
|
|
|
|
data = {"status": InvitedUserStatus.CANCELLED}
|
2023-12-07 16:26:25 -05:00
|
|
|
|
url = f"/service/{fake_uuid}/invite/{sample_invited_user.id}"
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.post(
|
|
|
|
|
|
url,
|
|
|
|
|
|
data=json.dumps(data),
|
|
|
|
|
|
headers=[("Content-Type", "application/json"), auth_header],
|
|
|
|
|
|
)
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert response.status_code == 404
|
2023-08-29 14:54:30 -07:00
|
|
|
|
json_response = json.loads(response.get_data(as_text=True))["message"]
|
|
|
|
|
|
assert json_response == "No result found"
|
2016-03-01 13:33:20 +00:00
|
|
|
|
|
|
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
def test_update_invited_user_for_invalid_data_returns_400(client, sample_invited_user):
|
2023-08-29 14:54:30 -07:00
|
|
|
|
data = {"status": "garbage"}
|
2023-12-07 16:26:25 -05:00
|
|
|
|
url = f"/service/{sample_invited_user.service_id}/invite/{sample_invited_user.id}"
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.post(
|
|
|
|
|
|
url,
|
|
|
|
|
|
data=json.dumps(data),
|
|
|
|
|
|
headers=[("Content-Type", "application/json"), auth_header],
|
|
|
|
|
|
)
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert response.status_code == 400
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
|
|
"endpoint_format_str",
|
|
|
|
|
|
[
|
|
|
|
|
|
"/invite/service/{}",
|
|
|
|
|
|
"/invite/service/check/{}",
|
|
|
|
|
|
],
|
|
|
|
|
|
)
|
|
|
|
|
|
def test_validate_invitation_token_returns_200_when_token_valid(
|
|
|
|
|
|
client, sample_invited_user, endpoint_format_str
|
|
|
|
|
|
):
|
|
|
|
|
|
token = generate_token(
|
|
|
|
|
|
str(sample_invited_user.id),
|
|
|
|
|
|
current_app.config["SECRET_KEY"],
|
|
|
|
|
|
current_app.config["DANGEROUS_SALT"],
|
|
|
|
|
|
)
|
2021-03-11 20:47:24 +00:00
|
|
|
|
url = endpoint_format_str.format(token)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.get(
|
|
|
|
|
|
url, headers=[("Content-Type", "application/json"), auth_header]
|
|
|
|
|
|
)
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["data"]["id"] == str(sample_invited_user.id)
|
|
|
|
|
|
assert json_resp["data"]["email_address"] == sample_invited_user.email_address
|
|
|
|
|
|
assert json_resp["data"]["from_user"] == str(sample_invited_user.user_id)
|
|
|
|
|
|
assert json_resp["data"]["service"] == str(sample_invited_user.service_id)
|
|
|
|
|
|
assert json_resp["data"]["status"] == sample_invited_user.status
|
|
|
|
|
|
assert json_resp["data"]["permissions"] == sample_invited_user.permissions
|
|
|
|
|
|
assert (
|
|
|
|
|
|
json_resp["data"]["folder_permissions"]
|
|
|
|
|
|
== sample_invited_user.folder_permissions
|
|
|
|
|
|
)
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_invitation_token_for_expired_token_returns_400(client):
|
2023-08-29 14:54:30 -07:00
|
|
|
|
with freeze_time("2016-01-01T12:00:00"):
|
|
|
|
|
|
token = generate_token(
|
|
|
|
|
|
str(uuid.uuid4()),
|
|
|
|
|
|
current_app.config["SECRET_KEY"],
|
|
|
|
|
|
current_app.config["DANGEROUS_SALT"],
|
|
|
|
|
|
)
|
2023-12-07 16:26:25 -05:00
|
|
|
|
url = f"/invite/service/{token}"
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.get(
|
|
|
|
|
|
url, headers=[("Content-Type", "application/json"), auth_header]
|
|
|
|
|
|
)
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 400
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["result"] == "error"
|
|
|
|
|
|
assert json_resp["message"] == {
|
2024-05-15 08:22:04 -07:00
|
|
|
|
"invitation": "Your invitation to Notify.gov has expired. "
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"Please ask the person that invited you to send you another one"
|
|
|
|
|
|
}
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_invitation_token_returns_400_when_invited_user_does_not_exist(client):
|
2023-08-29 14:54:30 -07:00
|
|
|
|
token = generate_token(
|
|
|
|
|
|
str(uuid.uuid4()),
|
|
|
|
|
|
current_app.config["SECRET_KEY"],
|
|
|
|
|
|
current_app.config["DANGEROUS_SALT"],
|
|
|
|
|
|
)
|
2023-12-07 16:26:25 -05:00
|
|
|
|
url = f"/invite/service/{token}"
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.get(
|
|
|
|
|
|
url, headers=[("Content-Type", "application/json"), auth_header]
|
|
|
|
|
|
)
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 404
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["result"] == "error"
|
|
|
|
|
|
assert json_resp["message"] == "No result found"
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_invitation_token_returns_400_when_token_is_malformed(client):
|
|
|
|
|
|
token = generate_token(
|
|
|
|
|
|
str(uuid.uuid4()),
|
2023-08-29 14:54:30 -07:00
|
|
|
|
current_app.config["SECRET_KEY"],
|
|
|
|
|
|
current_app.config["DANGEROUS_SALT"],
|
2021-03-11 20:26:44 +00:00
|
|
|
|
)[:-2]
|
|
|
|
|
|
|
2023-12-07 16:26:25 -05:00
|
|
|
|
url = f"/invite/service/{token}"
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2023-08-29 14:54:30 -07:00
|
|
|
|
response = client.get(
|
|
|
|
|
|
url, headers=[("Content-Type", "application/json"), auth_header]
|
|
|
|
|
|
)
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 400
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["result"] == "error"
|
|
|
|
|
|
assert json_resp["message"] == {
|
|
|
|
|
|
"invitation": "Something’s wrong with this link. Make sure you’ve copied the whole thing."
|
2021-03-11 20:26:44 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_get_invited_user(admin_request, sample_invited_user):
|
|
|
|
|
|
json_resp = admin_request.get(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service_invite.get_invited_user", invited_user_id=sample_invited_user.id
|
2021-03-11 20:26:44 +00:00
|
|
|
|
)
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["data"]["id"] == str(sample_invited_user.id)
|
|
|
|
|
|
assert json_resp["data"]["email_address"] == sample_invited_user.email_address
|
|
|
|
|
|
assert json_resp["data"]["service"] == str(sample_invited_user.service_id)
|
|
|
|
|
|
assert json_resp["data"]["permissions"] == sample_invited_user.permissions
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
2023-08-29 14:54:30 -07:00
|
|
|
|
def test_get_invited_user_404s_if_invite_doesnt_exist(
|
|
|
|
|
|
admin_request, sample_invited_user, fake_uuid
|
|
|
|
|
|
):
|
2021-03-11 20:26:44 +00:00
|
|
|
|
json_resp = admin_request.get(
|
2023-08-29 14:54:30 -07:00
|
|
|
|
"service_invite.get_invited_user",
|
2021-03-11 20:26:44 +00:00
|
|
|
|
invited_user_id=fake_uuid,
|
2023-08-29 14:54:30 -07:00
|
|
|
|
_expected_status=404,
|
2021-03-11 20:26:44 +00:00
|
|
|
|
)
|
2023-08-29 14:54:30 -07:00
|
|
|
|
assert json_resp["result"] == "error"
|