merged with diegos changes

This commit is contained in:
Sam
2021-02-04 12:13:12 +00:00
parent a61f11465c
commit 8d359cdb71
5 changed files with 55 additions and 36 deletions

View File

@@ -27,7 +27,7 @@ From inside the project's folder:
- Make migrations: - Make migrations:
``` ```bash
python manage.py makemigrations core geo companies products history stats python manage.py makemigrations core geo companies products history stats
python manage.py migrate python manage.py migrate
``` ```
@@ -69,7 +69,8 @@ Change password:
``` ```
Update user profile: Update user profile:
- endpoint: api/v1/user/update/<int:pk>/ - available for admin
- endpoint: api/v1/users/<int:pk>/
- method: PUT - method: PUT
- payload: - payload:
```json ```json

View File

@@ -18,7 +18,7 @@ from django.urls import path, include
from django.conf.urls.static import static from django.conf.urls.static import static
from django.conf import settings from django.conf import settings
from rest_framework_simplejwt.views import TokenRefreshView, TokenVerifyView from rest_framework_simplejwt.views import TokenObtainPairView, TokenRefreshView, TokenVerifyView
from core import views as core_views from core import views as core_views
from products import views as product_views from products import views as product_views
@@ -28,7 +28,7 @@ from .routers import router
urlpatterns = [ urlpatterns = [
path('admin/', admin.site.urls), path('admin/', admin.site.urls),
path('api/v1/token/', core_views.CustomTokenObtainPairView.as_view(), name='token_obtain_pair'), path('api/v1/token/', TokenObtainPairView.as_view(), name='token_obtain_pair'),
path('api/v1/token/refresh/', TokenRefreshView.as_view(), name='token_refresh'), path('api/v1/token/refresh/', TokenRefreshView.as_view(), name='token_refresh'),
path('api/v1/token/verify/', TokenVerifyView.as_view(), name='token_verify'), path('api/v1/token/verify/', TokenVerifyView.as_view(), name='token_verify'),
path('api/v1/user/change_password/<int:pk>/', core_views.ChangeUserPasswordView.as_view(), name="change-password"), path('api/v1/user/change_password/<int:pk>/', core_views.ChangeUserPasswordView.as_view(), name="change-password"),

View File

@@ -4,25 +4,13 @@ from rest_framework import serializers
from . import models from . import models
class CustomTokenObtainPairSerializer(TokenObtainPairSerializer):
def validate(self, attrs):
# The default result (access/refresh tokens)
data = super(CustomTokenObtainPairSerializer, self).validate(attrs)
# Add extra responses here
data['user'] = {}
data['user']['id'] = self.user.id
data['user']['email'] = self.user.email
data['user']['role'] = self.user.role
return data
class CustomUserSerializer(serializers.ModelSerializer): class CustomUserSerializer(serializers.ModelSerializer):
password = serializers.CharField(write_only=True, required=True, style={'input_type': 'password'}) password = serializers.CharField(write_only=True, required=True, style={'input_type': 'password'})
class Meta: class Meta:
model = models.CustomUser model = models.CustomUser
fields = ('id', 'email', 'full_name', 'role', 'password', 'is_active', 'notify') fields = ('id', 'email', 'full_name', 'role', 'password', 'is_active', 'notify')
class CustomUserAdminSerializer(serializers.ModelSerializer): class CustomUserAdminSerializer(serializers.ModelSerializer):
password = serializers.CharField(write_only=True, required=False, style={'input_type': 'password'}) password = serializers.CharField(write_only=True, required=False, style={'input_type': 'password'})
class Meta: class Meta:

View File

@@ -329,7 +329,7 @@ class UpdateUserViewTest(APITestCase):
def setUp(self): def setUp(self):
"""Tests setup """Tests setup
""" """
self.endpoint = '/api/v1/user/change_password/' self.endpoint = '/api/v1/users/'
self.factory = factories.CustomUserFactory self.factory = factories.CustomUserFactory
self.model = models.CustomUser self.model = models.CustomUser
# create regular user # create regular user
@@ -338,6 +338,11 @@ class UpdateUserViewTest(APITestCase):
self.user = self.factory(email=self.reg_email, is_active=True) self.user = self.factory(email=self.reg_email, is_active=True)
self.user.set_password(self.password) self.user.set_password(self.password)
self.user.save() self.user.save()
# create admin user
self.admin_email = f"admin_user@mail.com"
self.admin_user = self.factory(email=self.admin_email, is_staff=True, is_active=True)
self.admin_user.set_password(self.password)
self.admin_user.save()
def test_auth_user_can_modify_own_instance(self): def test_auth_user_can_modify_own_instance(self):
"""Regular user can modify own instance """Regular user can modify own instance
@@ -355,32 +360,62 @@ class UpdateUserViewTest(APITestCase):
self.client.credentials(HTTP_AUTHORIZATION=f"Bearer {token['access']}") self.client.credentials(HTTP_AUTHORIZATION=f"Bearer {token['access']}")
# Query endpoint # Query endpoint
url = f'/api/v1/user/update/{self.user.pk}/' url = f'{self.endpoint}{self.user.pk}/'
response = self.client.put(url, data=data, format='json') response = self.client.put(url, data=data, format='json')
# Assert forbidden code # Assert forbidden code
self.assertEqual(response.status_code, status.HTTP_200_OK) self.assertEqual(response.status_code, status.HTTP_200_OK)
def test_auth_user_cannot_modify_random_instance(self): def test_auth_user_cannot_modify_random_instance(self):
"""Regular user can modify own instance """Regular user cannot modify randnom instance
""" """
# Create instance # Create instance
instance = self.factory() instance = self.factory()
data = {
"email": "new_email@mail.com",
"full_name": "New Full Name",
'provider': 'PROVIDER',
}
# Authenticate # Authenticate
token = get_tokens_for_user(self.user) token = get_tokens_for_user(self.user)
self.client.credentials(HTTP_AUTHORIZATION=f"Bearer {token['access']}") self.client.credentials(HTTP_AUTHORIZATION=f"Bearer {token['access']}")
# Query endpoint # Query endpoint
url = f'/api/v1/user/update/{instance.pk}/' url = f'{self.endpoint}{instance.pk}/'
response = self.client.put(url, data=data, format='json') response = self.client.put(url, data={}, format='json')
# Assert forbidden code # Assert forbidden code
self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN) self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
def test_anon_user_cannot_modify_random_instance(self):
"""anon user cannot modify instance
"""
# Create instance
instance = self.factory()
# Query endpoint
url = f'{self.endpoint}{instance.pk}/'
response = self.client.put(url, data={}, format='json')
# Assert forbidden code
self.assertEqual(response.status_code, status.HTTP_401_UNAUTHORIZED)
def test_admin_user_can_modify_random_instance(self):
"""Regular user cannot modify randnom instance
"""
# Create instance
instance = self.factory()
# Authenticate
token = get_tokens_for_user(self.admin_user)
self.client.credentials(HTTP_AUTHORIZATION=f"Bearer {token['access']}")
data = {
"email": "new_email@mail.com",
"full_name": "New Full Name",
'provider': 'PROVIDER',
'notify': True,
}
# Query endpoint
url = f'{self.endpoint}{instance.pk}/'
response = self.client.put(url, data=data, format='json')
# Assert forbidden code
self.assertEqual(response.status_code, status.HTTP_200_OK)
class LoadCoopManagerTestCase(APITestCase): class LoadCoopManagerTestCase(APITestCase):
@@ -394,7 +429,9 @@ class LoadCoopManagerTestCase(APITestCase):
# create admin user # create admin user
self.admin_email = f"admin_user@mail.com" self.admin_email = f"admin_user@mail.com"
self.password = ''.join(random.choices(string.ascii_uppercase, k = 10)) self.password = ''.join(random.choices(string.ascii_uppercase, k = 10))
self.admin_user = self.user_factory(email=self.admin_email, password=self.password, is_staff=True, is_active=True) self.admin_user = self.user_factory(email=self.admin_email, is_staff=True, is_active=True)
self.admin_user.set_password(self.password)
self.admin_user.save()
# create regular user # create regular user
self.reg_email = f"user@mail.com" self.reg_email = f"user@mail.com"
self.user = self.user_factory(email=self.reg_email, is_active=True) self.user = self.user_factory(email=self.reg_email, is_active=True)

View File

@@ -15,7 +15,6 @@ from rest_framework.response import Response
from rest_framework.permissions import IsAdminUser, IsAuthenticated from rest_framework.permissions import IsAdminUser, IsAuthenticated
from rest_framework.generics import UpdateAPIView from rest_framework.generics import UpdateAPIView
from rest_framework.decorators import api_view, permission_classes from rest_framework.decorators import api_view, permission_classes
from rest_framework_simplejwt.views import TokenObtainPairView
from companies.models import Company from companies.models import Company
from history.models import HistorySync from history.models import HistorySync
@@ -38,12 +37,6 @@ logging.basicConfig(
) )
class CustomTokenObtainPairView(TokenObtainPairView):
serializer_class = core_serializers.CustomTokenObtainPairSerializer
class CustomUserViewSet(viewsets.ModelViewSet): class CustomUserViewSet(viewsets.ModelViewSet):
model = models.CustomUser model = models.CustomUser