2016-02-24 14:01:19 +00:00
|
|
|
|
import json
|
2021-03-11 20:26:44 +00:00
|
|
|
|
import uuid
|
2021-03-10 13:55:06 +00:00
|
|
|
|
|
2017-12-20 14:38:49 +00:00
|
|
|
|
import pytest
|
2020-09-15 16:45:24 +01:00
|
|
|
|
from flask import current_app
|
2021-03-11 20:26:44 +00:00
|
|
|
|
from freezegun import freeze_time
|
|
|
|
|
|
from notifications_utils.url_safe_token import generate_token
|
2016-02-24 14:01:19 +00:00
|
|
|
|
|
2021-03-10 13:55:06 +00:00
|
|
|
|
from app.models import EMAIL_AUTH_TYPE, SMS_AUTH_TYPE, Notification
|
2021-08-04 15:12:09 +01:00
|
|
|
|
from tests import create_admin_authorization_header
|
2019-10-31 15:02:30 +00:00
|
|
|
|
from tests.app.db import create_invited_user
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
|
|
|
|
|
|
2017-12-20 14:38:49 +00:00
|
|
|
|
@pytest.mark.parametrize('extra_args, expected_start_of_invite_url', [
|
|
|
|
|
|
(
|
|
|
|
|
|
{},
|
|
|
|
|
|
'http://localhost:6012/invitation/'
|
|
|
|
|
|
),
|
|
|
|
|
|
(
|
|
|
|
|
|
{'invite_link_host': 'https://www.example.com'},
|
|
|
|
|
|
'https://www.example.com/invitation/'
|
|
|
|
|
|
),
|
|
|
|
|
|
])
|
|
|
|
|
|
def test_create_invited_user(
|
|
|
|
|
|
admin_request,
|
|
|
|
|
|
sample_service,
|
|
|
|
|
|
mocker,
|
|
|
|
|
|
invitation_email_template,
|
|
|
|
|
|
extra_args,
|
|
|
|
|
|
expected_start_of_invite_url,
|
|
|
|
|
|
):
|
2016-12-20 15:59:31 +00:00
|
|
|
|
mocked = mocker.patch('app.celery.provider_tasks.deliver_email.apply_async')
|
|
|
|
|
|
email_address = 'invited_user@service.gov.uk'
|
|
|
|
|
|
invite_from = sample_service.users[0]
|
|
|
|
|
|
|
2017-12-20 14:38:49 +00:00
|
|
|
|
data = dict(
|
|
|
|
|
|
service=str(sample_service.id),
|
|
|
|
|
|
email_address=email_address,
|
|
|
|
|
|
from_user=str(invite_from.id),
|
|
|
|
|
|
permissions='send_messages,manage_service,manage_api_keys',
|
|
|
|
|
|
auth_type=EMAIL_AUTH_TYPE,
|
2019-03-11 14:33:51 +00:00
|
|
|
|
folder_permissions=['folder_1', 'folder_2', 'folder_3'],
|
2017-12-20 14:38:49 +00:00
|
|
|
|
**extra_args
|
|
|
|
|
|
)
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
2017-10-30 11:53:55 +00:00
|
|
|
|
json_resp = admin_request.post(
|
2021-03-05 20:13:56 +00:00
|
|
|
|
'service_invite.create_invited_user',
|
2017-10-30 11:53:55 +00:00
|
|
|
|
service_id=sample_service.id,
|
|
|
|
|
|
_data=data,
|
|
|
|
|
|
_expected_status=201
|
2016-12-20 15:59:31 +00:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
assert json_resp['data']['service'] == str(sample_service.id)
|
|
|
|
|
|
assert json_resp['data']['email_address'] == email_address
|
|
|
|
|
|
assert json_resp['data']['from_user'] == str(invite_from.id)
|
|
|
|
|
|
assert json_resp['data']['permissions'] == 'send_messages,manage_service,manage_api_keys'
|
2017-10-30 11:53:55 +00:00
|
|
|
|
assert json_resp['data']['auth_type'] == EMAIL_AUTH_TYPE
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert json_resp['data']['id']
|
2019-03-11 14:33:51 +00:00
|
|
|
|
assert json_resp['data']['folder_permissions'] == ['folder_1', 'folder_2', 'folder_3']
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
|
|
|
|
|
notification = Notification.query.first()
|
2017-12-20 14:38:49 +00:00
|
|
|
|
|
2017-12-18 11:39:21 +00:00
|
|
|
|
assert notification.reply_to_text == invite_from.email_address
|
2017-12-20 14:38:49 +00:00
|
|
|
|
|
|
|
|
|
|
assert len(notification.personalisation.keys()) == 3
|
|
|
|
|
|
assert notification.personalisation['service_name'] == 'Sample service'
|
|
|
|
|
|
assert notification.personalisation['user_name'] == 'Test User'
|
|
|
|
|
|
assert notification.personalisation['url'].startswith(expected_start_of_invite_url)
|
|
|
|
|
|
assert len(notification.personalisation['url']) > len(expected_start_of_invite_url)
|
2020-09-15 16:45:24 +01:00
|
|
|
|
assert str(notification.template_id) == current_app.config['INVITATION_EMAIL_TEMPLATE_ID']
|
|
|
|
|
|
|
|
|
|
|
|
mocked.assert_called_once_with([(str(notification.id))], queue="notify-internal-tasks")
|
|
|
|
|
|
|
|
|
|
|
|
|
2017-10-30 11:53:55 +00:00
|
|
|
|
def test_create_invited_user_without_auth_type(admin_request, sample_service, mocker, invitation_email_template):
|
2017-11-28 17:21:21 +00:00
|
|
|
|
mocker.patch('app.celery.provider_tasks.deliver_email.apply_async')
|
2017-10-30 11:53:55 +00:00
|
|
|
|
email_address = 'invited_user@service.gov.uk'
|
|
|
|
|
|
invite_from = sample_service.users[0]
|
|
|
|
|
|
|
|
|
|
|
|
data = {
|
|
|
|
|
|
'service': str(sample_service.id),
|
|
|
|
|
|
'email_address': email_address,
|
|
|
|
|
|
'from_user': str(invite_from.id),
|
|
|
|
|
|
'permissions': 'send_messages,manage_service,manage_api_keys',
|
2019-03-11 14:33:51 +00:00
|
|
|
|
'folder_permissions': []
|
2017-10-30 11:53:55 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
json_resp = admin_request.post(
|
2021-03-05 20:13:56 +00:00
|
|
|
|
'service_invite.create_invited_user',
|
2017-10-30 11:53:55 +00:00
|
|
|
|
service_id=sample_service.id,
|
|
|
|
|
|
_data=data,
|
|
|
|
|
|
_expected_status=201
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
assert json_resp['data']['auth_type'] == SMS_AUTH_TYPE
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-03-11 14:33:51 +00:00
|
|
|
|
def test_create_invited_user_invalid_email(client, sample_service, mocker, fake_uuid):
|
2016-12-20 15:59:31 +00:00
|
|
|
|
mocked = mocker.patch('app.celery.provider_tasks.deliver_email.apply_async')
|
|
|
|
|
|
email_address = 'notanemail'
|
|
|
|
|
|
invite_from = sample_service.users[0]
|
|
|
|
|
|
|
|
|
|
|
|
data = {
|
|
|
|
|
|
'service': str(sample_service.id),
|
|
|
|
|
|
'email_address': email_address,
|
|
|
|
|
|
'from_user': str(invite_from.id),
|
2019-03-11 14:33:51 +00:00
|
|
|
|
'permissions': 'send_messages,manage_service,manage_api_keys',
|
|
|
|
|
|
'folder_permissions': [fake_uuid, fake_uuid]
|
2016-12-20 15:59:31 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
data = json.dumps(data)
|
|
|
|
|
|
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-12-20 15:59:31 +00:00
|
|
|
|
|
|
|
|
|
|
response = client.post(
|
|
|
|
|
|
'/service/{}/invite'.format(sample_service.id),
|
|
|
|
|
|
headers=[('Content-Type', 'application/json'), auth_header],
|
|
|
|
|
|
data=data
|
|
|
|
|
|
)
|
|
|
|
|
|
assert response.status_code == 400
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
|
|
|
|
|
assert json_resp['result'] == 'error'
|
2017-01-09 16:22:27 +00:00
|
|
|
|
assert json_resp['message'] == {'email_address': ['Not a valid email address']}
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert mocked.call_count == 0
|
|
|
|
|
|
|
|
|
|
|
|
|
2022-05-03 17:00:51 +01:00
|
|
|
|
def test_get_all_invited_users_by_service(client, notify_db_session, sample_service):
|
2016-02-25 11:22:36 +00:00
|
|
|
|
invites = []
|
|
|
|
|
|
for i in range(0, 5):
|
|
|
|
|
|
email = 'invited_user_{}@service.gov.uk'.format(i)
|
2019-10-31 15:02:30 +00:00
|
|
|
|
invited_user = create_invited_user(sample_service, to_email_address=email)
|
2016-02-25 11:22:36 +00:00
|
|
|
|
invites.append(invited_user)
|
|
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
url = '/service/{}/invite'.format(sample_service.id)
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.get(
|
|
|
|
|
|
url,
|
|
|
|
|
|
headers=[('Content-Type', 'application/json'), auth_header]
|
|
|
|
|
|
)
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
invite_from = sample_service.users[0]
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
for invite in json_resp['data']:
|
|
|
|
|
|
assert invite['service'] == str(sample_service.id)
|
|
|
|
|
|
assert invite['from_user'] == str(invite_from.id)
|
2017-11-03 09:51:50 +00:00
|
|
|
|
assert invite['auth_type'] == SMS_AUTH_TYPE
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert invite['id']
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
2022-05-03 17:00:51 +01:00
|
|
|
|
def test_get_invited_users_by_service_with_no_invites(client, notify_db_session, sample_service):
|
2016-12-20 15:59:31 +00:00
|
|
|
|
url = '/service/{}/invite'.format(sample_service.id)
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.get(
|
|
|
|
|
|
url,
|
|
|
|
|
|
headers=[('Content-Type', 'application/json'), auth_header]
|
|
|
|
|
|
)
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
|
|
|
|
|
assert len(json_resp['data']) == 0
|
2016-02-25 11:22:36 +00:00
|
|
|
|
|
|
|
|
|
|
|
2020-08-17 11:59:55 +01:00
|
|
|
|
def test_get_invited_user_by_service(admin_request, sample_invited_user):
|
|
|
|
|
|
json_resp = admin_request.get(
|
2021-03-05 20:13:56 +00:00
|
|
|
|
'service_invite.get_invited_user_by_service',
|
2020-08-17 11:59:55 +01:00
|
|
|
|
service_id=sample_invited_user.service.id,
|
|
|
|
|
|
invited_user_id=sample_invited_user.id
|
|
|
|
|
|
)
|
|
|
|
|
|
assert json_resp['data']['email_address'] == sample_invited_user.email_address
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_get_invited_user_by_service_when_user_does_not_belong_to_the_service(
|
|
|
|
|
|
admin_request,
|
|
|
|
|
|
sample_invited_user,
|
|
|
|
|
|
fake_uuid,
|
|
|
|
|
|
):
|
|
|
|
|
|
json_resp = admin_request.get(
|
2021-03-05 20:13:56 +00:00
|
|
|
|
'service_invite.get_invited_user_by_service',
|
2020-08-17 11:59:55 +01:00
|
|
|
|
service_id=fake_uuid,
|
|
|
|
|
|
invited_user_id=sample_invited_user.id,
|
|
|
|
|
|
_expected_status=404
|
|
|
|
|
|
)
|
|
|
|
|
|
assert json_resp['result'] == 'error'
|
|
|
|
|
|
|
|
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
def test_update_invited_user_set_status_to_cancelled(client, sample_invited_user):
|
|
|
|
|
|
data = {'status': 'cancelled'}
|
|
|
|
|
|
url = '/service/{0}/invite/{1}'.format(sample_invited_user.service_id, sample_invited_user.id)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.post(url,
|
|
|
|
|
|
data=json.dumps(data),
|
|
|
|
|
|
headers=[('Content-Type', 'application/json'), auth_header])
|
2016-03-01 13:33:20 +00:00
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))['data']
|
|
|
|
|
|
assert json_resp['status'] == 'cancelled'
|
2016-03-01 13:33:20 +00:00
|
|
|
|
|
|
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
def test_update_invited_user_for_wrong_service_returns_404(client, sample_invited_user, fake_uuid):
|
|
|
|
|
|
data = {'status': 'cancelled'}
|
|
|
|
|
|
url = '/service/{0}/invite/{1}'.format(fake_uuid, sample_invited_user.id)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.post(url, data=json.dumps(data),
|
|
|
|
|
|
headers=[('Content-Type', 'application/json'), auth_header])
|
|
|
|
|
|
assert response.status_code == 404
|
|
|
|
|
|
json_response = json.loads(response.get_data(as_text=True))['message']
|
|
|
|
|
|
assert json_response == 'No result found'
|
2016-03-01 13:33:20 +00:00
|
|
|
|
|
|
|
|
|
|
|
2016-12-20 15:59:31 +00:00
|
|
|
|
def test_update_invited_user_for_invalid_data_returns_400(client, sample_invited_user):
|
|
|
|
|
|
data = {'status': 'garbage'}
|
|
|
|
|
|
url = '/service/{0}/invite/{1}'.format(sample_invited_user.service_id, sample_invited_user.id)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2016-12-20 15:59:31 +00:00
|
|
|
|
response = client.post(url, data=json.dumps(data),
|
|
|
|
|
|
headers=[('Content-Type', 'application/json'), auth_header])
|
|
|
|
|
|
assert response.status_code == 400
|
2021-03-11 20:26:44 +00:00
|
|
|
|
|
|
|
|
|
|
|
2021-03-11 20:47:24 +00:00
|
|
|
|
@pytest.mark.parametrize('endpoint_format_str', [
|
|
|
|
|
|
'/invite/service/{}',
|
|
|
|
|
|
'/invite/service/check/{}',
|
|
|
|
|
|
])
|
|
|
|
|
|
def test_validate_invitation_token_returns_200_when_token_valid(client, sample_invited_user, endpoint_format_str):
|
2021-03-11 20:26:44 +00:00
|
|
|
|
token = generate_token(str(sample_invited_user.id), current_app.config['SECRET_KEY'],
|
|
|
|
|
|
current_app.config['DANGEROUS_SALT'])
|
2021-03-11 20:47:24 +00:00
|
|
|
|
url = endpoint_format_str.format(token)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2021-03-11 20:26:44 +00:00
|
|
|
|
response = client.get(url, headers=[('Content-Type', 'application/json'), auth_header])
|
|
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
|
|
|
|
|
assert json_resp['data']['id'] == str(sample_invited_user.id)
|
|
|
|
|
|
assert json_resp['data']['email_address'] == sample_invited_user.email_address
|
|
|
|
|
|
assert json_resp['data']['from_user'] == str(sample_invited_user.user_id)
|
|
|
|
|
|
assert json_resp['data']['service'] == str(sample_invited_user.service_id)
|
|
|
|
|
|
assert json_resp['data']['status'] == sample_invited_user.status
|
|
|
|
|
|
assert json_resp['data']['permissions'] == sample_invited_user.permissions
|
|
|
|
|
|
assert json_resp['data']['folder_permissions'] == sample_invited_user.folder_permissions
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_invitation_token_for_expired_token_returns_400(client):
|
|
|
|
|
|
with freeze_time('2016-01-01T12:00:00'):
|
|
|
|
|
|
token = generate_token(str(uuid.uuid4()), current_app.config['SECRET_KEY'],
|
|
|
|
|
|
current_app.config['DANGEROUS_SALT'])
|
|
|
|
|
|
url = '/invite/service/{}'.format(token)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2021-03-11 20:26:44 +00:00
|
|
|
|
response = client.get(url, headers=[('Content-Type', 'application/json'), auth_header])
|
|
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 400
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
|
|
|
|
|
assert json_resp['result'] == 'error'
|
|
|
|
|
|
assert json_resp['message'] == {
|
|
|
|
|
|
'invitation': 'Your invitation to GOV.UK Notify has expired. '
|
|
|
|
|
|
'Please ask the person that invited you to send you another one'}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_invitation_token_returns_400_when_invited_user_does_not_exist(client):
|
|
|
|
|
|
token = generate_token(str(uuid.uuid4()), current_app.config['SECRET_KEY'],
|
|
|
|
|
|
current_app.config['DANGEROUS_SALT'])
|
|
|
|
|
|
url = '/invite/service/{}'.format(token)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2021-03-11 20:26:44 +00:00
|
|
|
|
response = client.get(url, headers=[('Content-Type', 'application/json'), auth_header])
|
|
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 404
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
|
|
|
|
|
assert json_resp['result'] == 'error'
|
|
|
|
|
|
assert json_resp['message'] == 'No result found'
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_invitation_token_returns_400_when_token_is_malformed(client):
|
|
|
|
|
|
token = generate_token(
|
|
|
|
|
|
str(uuid.uuid4()),
|
|
|
|
|
|
current_app.config['SECRET_KEY'],
|
|
|
|
|
|
current_app.config['DANGEROUS_SALT']
|
|
|
|
|
|
)[:-2]
|
|
|
|
|
|
|
|
|
|
|
|
url = '/invite/service/{}'.format(token)
|
2021-08-04 15:12:09 +01:00
|
|
|
|
auth_header = create_admin_authorization_header()
|
2021-03-11 20:26:44 +00:00
|
|
|
|
response = client.get(url, headers=[('Content-Type', 'application/json'), auth_header])
|
|
|
|
|
|
|
|
|
|
|
|
assert response.status_code == 400
|
|
|
|
|
|
json_resp = json.loads(response.get_data(as_text=True))
|
|
|
|
|
|
assert json_resp['result'] == 'error'
|
|
|
|
|
|
assert json_resp['message'] == {
|
|
|
|
|
|
'invitation': 'Something’s wrong with this link. Make sure you’ve copied the whole thing.'
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_get_invited_user(admin_request, sample_invited_user):
|
|
|
|
|
|
json_resp = admin_request.get(
|
|
|
|
|
|
'service_invite.get_invited_user',
|
|
|
|
|
|
invited_user_id=sample_invited_user.id
|
|
|
|
|
|
)
|
|
|
|
|
|
assert json_resp['data']['id'] == str(sample_invited_user.id)
|
|
|
|
|
|
assert json_resp['data']['email_address'] == sample_invited_user.email_address
|
|
|
|
|
|
assert json_resp['data']['service'] == str(sample_invited_user.service_id)
|
|
|
|
|
|
assert json_resp['data']['permissions'] == sample_invited_user.permissions
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test_get_invited_user_404s_if_invite_doesnt_exist(admin_request, sample_invited_user, fake_uuid):
|
|
|
|
|
|
json_resp = admin_request.get(
|
|
|
|
|
|
'service_invite.get_invited_user',
|
|
|
|
|
|
invited_user_id=fake_uuid,
|
|
|
|
|
|
_expected_status=404
|
|
|
|
|
|
)
|
|
|
|
|
|
assert json_resp['result'] == 'error'
|