Merge branch 'master' of gitlab.prodcontest.ru:team-15/project

This commit is contained in:
moolcoov
2025-03-01 23:26:52 +03:00
10 changed files with 398 additions and 30 deletions
+4 -1
View File
@@ -19,7 +19,10 @@ class BearerAuth(HttpBearer):
except Exception:
raise AuthenticationError
user = User.objects.get(id=data["id"])
try:
user = User.objects.get(id=data["id"])
except User.DoesNotExist:
raise AuthenticationError
return user
@staticmethod
+108
View File
@@ -0,0 +1,108 @@
import uuid
from django.contrib.auth.hashers import make_password
from django.test import TestCase
from apps.user.models import User
from apps.competition.models import Competition
class CompetitionEndpointTests(TestCase):
def setUp(self):
self.user = User.objects.create(
email="user@example.com",
password=make_password("password123"),
username="t1wk4"
)
self.competition = Competition.objects.create(
title="AI Challenge",
description="Machine Learning Competition",
type="solo",
participation_type="edu"
)
resp = self.client.post(
"/api/v1/sign-in",
data={"email": self.user.email, "password": "password123"},
content_type="application/json",
).json()
token = resp["token"]
self.valid_headers = {
"HTTP_AUTHORIZATION": f"Bearer {token}"
}
# --- Helper methods ---
def get_url(self, competition_id):
return f"/api/v1/competition/{competition_id}"
# --- Test Cases ---
def test_get_competition_success(self):
"""Authenticated user gets competition details (200 OK)"""
response = self.client.get(
self.get_url(self.competition.id),
**self.valid_headers
)
self.assertEqual(response.status_code, 200)
data = response.json()
# Validate required fields
self.assertEqual(data["id"], str(self.competition.id))
self.assertEqual(data["title"], "AI Challenge")
self.assertEqual(data["type"], "solo")
# Validate optional null fields
self.assertIsNone(data["image_url"])
self.assertIsNone(data["start_date"])
self.assertIsNone(data["end_date"])
def test_invalid_uuid_format(self):
"""Invalid UUID format returns 400 Bad Request"""
response = self.client.get(
self.get_url("invalid-id"),
**self.valid_headers
)
self.assertEqual(response.status_code, 400)
def test_unauthenticated_access(self):
"""Missing auth token returns 401 Unauthorized"""
response = self.client.get(self.get_url(self.competition.id))
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
def test_nonexistent_competition(self):
"""Valid UUID but missing competition returns 404"""
new_uuid = uuid.uuid4()
response = self.client.get(
self.get_url(new_uuid),
**self.valid_headers
)
self.assertEqual(response.status_code, 404)
self.assertEqual(response.json()["detail"], "Not Found")
def test_invalid_auth_token(self):
"""Invalid token returns 401 Unauthorized"""
response = self.client.get(
self.get_url(self.competition.id),
HTTP_AUTHORIZATION="Bearer invalid_token"
)
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
def test_malformed_auth_header(self):
"""Malformed Authorization header returns 401"""
cases = [
("InvalidScheme valid_token_123", 401),
("Bearer", 401), # Missing token
("", 401), # No header
]
for header, expected_status in cases:
with self.subTest(header=header):
response = self.client.get(
self.get_url(self.competition.id),
HTTP_AUTHORIZATION=header
)
self.assertEqual(response.status_code, expected_status)
+4 -3
View File
@@ -14,10 +14,11 @@ class User(BaseModel):
username = models.SlugField(unique=True, verbose_name="юзернейм")
password = models.TextField(verbose_name="пароль")
def make_password(self):
return make_password(self.password)
@staticmethod
def make_password(password: str):
return make_password(password)
def check_password(self, password):
def check_password(self, password: str):
return check_password(self.password, password)
status = models.CharField(
+208 -20
View File
@@ -1,29 +1,217 @@
from django.core.exceptions import ValidationError
import json
import uuid
from django.test import TestCase
from django.contrib.auth.hashers import make_password
from apps.user.models import User
class TestSignUp(TestCase):
def test_correct_signup(self):
user = User(
email="123123@timka.su",
password="1321312",
username="123123",
class SignUpAPITestCase(TestCase):
def test_successful_sign_up(self):
payload = {
"email": "user@example.com",
"password": "securepassword123",
"username": "123",
}
response = self.client.post(
"/api/v1/sign-up",
data=json.dumps(payload),
content_type="application/json",
)
user.full_clean()
user.save()
self.assertEqual(response.status_code, 201)
self.assertIn("token", response.json())
self.assertEqual(User.objects.count(), 1)
def test_incorrect_mail(self):
user = User(
email="123123",
password="1321312",
username="123123123",
def test_missing_required_fields(self):
payload = {"password": "testpass123", "username": "sffsdf"}
response = self.client.post(
"/api/v1/sign-up",
data=json.dumps(payload),
content_type="application/json",
)
with self.assertRaises(ValidationError):
user.full_clean()
self.assertEqual(response.status_code, 400)
def test_missing_params(self):
user = User(password="123123", username="132131232131")
with self.assertRaises(ValidationError):
user.full_clean()
def test_invalid_email_format(self):
payload = {
"email": "ervtb uktr bym",
"password": "securepassword123",
"username": "123",
}
response = self.client.post(
"/api/v1/sign-up",
data=json.dumps(payload),
content_type="application/json",
)
self.assertEqual(response.status_code, 400)
def test_existing_user_conflict(self):
User.objects.create(
email="existing@example.com", password="existingpass123", username="testing"
)
payload = {
"email": "existing@example.com",
"password": "sfsad",
"username": "testing",
}
response = self.client.post(
"/api/v1/sign-up",
data=json.dumps(payload),
content_type="application/json",
)
self.assertEqual(response.status_code, 409)
self.assertIn("detail", response.json())
class SignInAPITestCase(TestCase):
def setUp(self):
self.user = User.objects.create(
email="valid@example.com",
password=make_password("securepassword123"),
username="testuser"
)
self.valid_payload = {
"email": "valid@example.com",
"password": "securepassword123"
}
def test_successful_sign_in(self):
response = self.client.post(
"/api/v1/sign-in",
data=json.dumps(self.valid_payload),
content_type="application/json"
)
self.assertEqual(response.status_code, 200)
self.assertIn("token", response.json())
def test_missing_credentials(self):
# Test missing email
response = self.client.post(
"/api/v1/sign-in",
data=json.dumps({"password": "pass"}),
content_type="application/json"
)
self.assertEqual(response.status_code, 400)
# Test missing password
response = self.client.post(
"/api/v1/sign-in",
data=json.dumps({"email": "test@example.com"}),
content_type="application/json"
)
self.assertEqual(response.status_code, 400)
def test_invalid_email_format(self):
payload = {
"email": "invalid-email",
"password": "password123"
}
response = self.client.post(
"/api/v1/sign-in",
data=json.dumps(payload),
content_type="application/json"
)
self.assertEqual(response.status_code, 401)
def test_incorrect_password(self):
payload = {
"email": "valid@example.com",
"password": "wrongpassword"
}
response = self.client.post(
"/api/v1/sign-in",
data=json.dumps(payload),
content_type="application/json"
)
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
def test_nonexistent_user(self):
payload = {
"email": "notexist@example.com",
"password": "password123"
}
response = self.client.post(
"/api/v1/sign-in",
data=json.dumps(payload),
content_type="application/json"
)
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
class UserMeEndpointTestCase(TestCase):
def setUp(self):
# Create test user and token
self.user = User.objects.create(
email="johndoe@example.com",
username="johndoe",
password=make_password("securepassword123")
)
resp = self.client.post(
"/api/v1/sign-in",
data=json.dumps({"email": "johndoe@example.com", "password": "securepassword123"}),
content_type="application/json"
).json()
self.token = resp['token']
self.url = "/api/v1/me"
def test_get_authenticated_user_data(self):
"""Test authenticated user can retrieve their profile (200 OK)"""
response = self.client.get(
self.url,
HTTP_AUTHORIZATION=f"Bearer {self.token}"
)
self.assertEqual(response.status_code, 200)
data = response.json()
# Validate UserSchema structure
self.assertIn("id", data)
self.assertIn("email", data)
self.assertIn("username", data)
# Validate UUID format if ID is present
if data["id"] is not None:
try:
uuid.UUID(data["id"])
except ValueError:
self.fail("ID is not a valid UUID")
# Validate response content
self.assertEqual(data["email"], "johndoe@example.com")
self.assertEqual(data["username"], "johndoe")
def test_unauthenticated_access(self):
"""Test unauthorized access returns 401 Unauthorized"""
response = self.client.get(self.url)
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
def test_invalid_auth_scheme(self):
"""Test invalid authentication scheme returns 401"""
response = self.client.get(
self.url,
HTTP_AUTHORIZATION=f"InvalidScheme {self.token}"
)
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
def test_malformed_token(self):
"""Test malformed token returns 401"""
test_cases = [
"invalid.token.123",
"Bearer",
"",
"123456"
]
for token in test_cases:
with self.subTest(token=token):
response = self.client.get(
self.url,
HTTP_AUTHORIZATION=f"Bearer {token}"
)
self.assertEqual(response.status_code, 401)
self.assertEqual(response.json()["detail"], "Unauthorized")
+1
View File
@@ -485,6 +485,7 @@ LANGUAGE_COOKIE_AGE = 31449600
PASSWORD_HASHERS = [
"django.contrib.auth.hashers.Argon2PasswordHasher",
"django.contrib.auth.hashers.ScryptPasswordHasher",
]
LANGUAGE_COOKIE_DOMAIN = None