This commit is contained in:
Joel Falknau 2024-12-30 22:26:35 +10:00
parent 8f33c649b3
commit a5f2e29a46
No known key found for this signature in database
5 changed files with 84 additions and 149 deletions

View File

@ -0,0 +1,48 @@
import random
import string
from allianceauth.eveonline.models import EveCharacter
from allianceauth.services.hooks import NameFormatter
from passlib.hash import bcrypt_sha256
from django.db import models
from allianceauth.services.abstract import AbstractServiceModel
import logging
from django.contrib.auth.models import User
from django.utils.translation import gettext_lazy as _
logger = logging.getLogger(__name__)
class MumbleManager(models.Manager):
@staticmethod
def get_username(user) -> str:
return user.profile.main_character.character_name # main character as the user.username may be incorrect
@staticmethod
def sanitise_username(username) -> str:
return username.replace(" ", "_")
@staticmethod
def generate_random_pass() -> str:
return ''.join([random.choice(string.ascii_letters + string.digits) for n in range(16)])
@staticmethod
def gen_pwhash(password) -> str:
return bcrypt_sha256.encrypt(password.encode('utf-8'))
def create(self, user):
try:
username = self.get_username(user)
logger.debug(f"Creating mumble user with username {username}")
username_clean = self.sanitise_username(username)
password = self.generate_random_pass()
pwhash = self.gen_pwhash(password)
logger.debug("Proceeding with mumble user creation: clean username {}, pwhash starts with {}".format(
username_clean, pwhash[0:5]))
logger.info(f"Creating mumble user {username_clean}")
result = super().create(user=user, username=username_clean, pwhash=pwhash)
result.credentials.update({'username': result.username, 'password': password})
return result
except AttributeError: # No Main or similar errors
return False
return False

View File

@ -2,6 +2,7 @@ import random
import string import string
from allianceauth.eveonline.models import EveCharacter from allianceauth.eveonline.models import EveCharacter
from allianceauth.services.hooks import NameFormatter from allianceauth.services.hooks import NameFormatter
from allianceauth.services.modules.mumble.managers import MumbleManager
from passlib.hash import bcrypt_sha256 from passlib.hash import bcrypt_sha256
from django.db import models from django.db import models
from allianceauth.services.abstract import AbstractServiceModel from allianceauth.services.abstract import AbstractServiceModel
@ -49,26 +50,17 @@ class MumbleUser(AbstractServiceModel):
blank=True, null=True, editable=False, blank=True, null=True, editable=False,
help_text="Timestamp of the users Last Disconnection from Mumble") help_text="Timestamp of the users Last Disconnection from Mumble")
objects = MumbleManager()
@property @property
def display_name(self) -> str: def display_name(self) -> str:
from .auth_hooks import MumbleService from .auth_hooks import MumbleService
return NameFormatter(MumbleService(), self.user).format_name() return NameFormatter(MumbleService(), self.user).format_name()
@staticmethod @property
def get_username(user) -> str: def groups(self) -> str:
return user.profile.main_character.character_name # main character as the user.username may be incorrect # Not sure where this is used, there was a test for it
return self.group_string()
@staticmethod
def sanitise_username(username) -> str:
return username.replace(" ", "_")
@staticmethod
def generate_random_pass() -> str:
return ''.join([random.choice(string.ascii_letters + string.digits) for n in range(16)])
@staticmethod
def gen_pwhash(password) -> str:
return bcrypt_sha256.encrypt(password.encode('utf-8'))
def __str__(self) -> str: def __str__(self) -> str:
return f"{self.username}" return f"{self.username}"
@ -77,8 +69,8 @@ class MumbleUser(AbstractServiceModel):
init_password = password init_password = password
logger.debug(f"Updating mumble user {self.user} password.") logger.debug(f"Updating mumble user {self.user} password.")
if not password: if not password:
password = self.generate_random_pass() password = MumbleManager.generate_random_pass()
pwhash = self.gen_pwhash(password) pwhash = MumbleManager.gen_pwhash(password)
logger.debug(f"Proceeding with mumble user {self.user} password update - pwhash starts with {pwhash[0:5]}") logger.debug(f"Proceeding with mumble user {self.user} password update - pwhash starts with {pwhash[0:5]}")
self.pwhash = pwhash self.pwhash = pwhash
self.hashfn = self.HashFunction.SHA256 self.hashfn = self.HashFunction.SHA256
@ -101,24 +93,6 @@ class MumbleUser(AbstractServiceModel):
groups_str.append(str(group.name)) groups_str.append(str(group.name))
return ','.join({g.replace(' ', '-') for g in groups_str}) return ','.join({g.replace(' ', '-') for g in groups_str})
def create(self, user):
try:
username = self.get_username(user)
logger.debug(f"Creating mumble user with username {username}")
username_clean = self.sanitise_username(username)
password = self.generate_random_pass()
pwhash = self.gen_pwhash(password)
logger.debug("Proceeding with mumble user creation: clean username {}, pwhash starts with {}".format(
username_clean, pwhash[0:5]))
logger.info(f"Creating mumble user {username_clean}")
result = super().create(user=user, username=username_clean, pwhash=pwhash)
result.credentials.update({'username': result.username, 'password': password})
return result
except AttributeError: # No Main or similar errors
return False
return False
class Meta: class Meta:
verbose_name = _("User") verbose_name = _("User")
verbose_name_plural = _("Users") verbose_name_plural = _("Users")
@ -181,6 +155,11 @@ class TempUser(models.Model):
from .auth_hooks import MumbleService from .auth_hooks import MumbleService
return NameFormatter(MumbleService(), self.user).format_name() return NameFormatter(MumbleService(), self.user).format_name()
@property
def groups(self) -> str:
# Not sure where this is used, there was a test for it
return self.group_string()
@staticmethod @staticmethod
def get_username(user) -> str: def get_username(user) -> str:
return user.profile.main_character.character_name # main character as the user.username may be incorrect return user.profile.main_character.character_name # main character as the user.username may be incorrect

View File

@ -4,17 +4,17 @@
{% block title %} {% block title %}
{{ service_name }} {{ service_name }}
{% endblock %} {% endblock title %}
{% block url %} {% block url %}
{% if username != '' %} {% if username != '' %}
<a href="mumble://{{ connect_url }}">{{ service_url }}</a> <a href="mumble://{{ connect_url }}">{{ service_url }}</a>
{% endif %} {% endif %}
{% endblock %} {% endblock url %}
{% block user %} {% block user %}
{% include "services/service_username.html" with username=username %} {% include "services/service_username.html" with username=username %}
{% endblock %} {% endblock user %}
{% block controls %} {% block controls %}
{% if username == "" %} {% if username == "" %}
@ -53,4 +53,4 @@
<i class="fa-solid fa-clock-rotate-left"></i> History <i class="fa-solid fa-clock-rotate-left"></i> History
</a> </a>
{% endif %} {% endif %}
{% endblock %} {% endblock controls %}

View File

@ -1,4 +1,6 @@
import unittest import unittest
from allianceauth.authentication.admin import Permission
from allianceauth.tests.auth_utils import AuthUtils
from django.test import TestCase from django.test import TestCase
from django.utils import timezone from django.utils import timezone
from django.contrib.auth.models import User, Group from django.contrib.auth.models import User, Group
@ -13,25 +15,25 @@ from ..models import (
MumbleServerServer MumbleServerServer
) )
MODULE_PATH = 'allianceauth.services.modules.mumble'
DEFAULT_AUTH_GROUP = 'Member'
def add_permissions():
permission = Permission.objects.get(codename='access_mumble')
members = Group.objects.get_or_create(name=DEFAULT_AUTH_GROUP)[0]
AuthUtils.add_permissions_to_groups([permission], [members])
class MumbleUserTests(TestCase): class MumbleUserTests(TestCase):
def setUp(self): def setUp(self):
""" self.member = AuthUtils.create_member('auth_member')
Create test data before each test. self.member.email = 'auth_member@example.com'
""" self.member.save()
# Create a regular Django user AuthUtils.add_main_character(self.member, 'john_mumble', '12345', corp_id='111', corp_name='Test Corporation', corp_ticker='TESTR')
self.user = User.objects.create_user(username='john', password='johnpassword') self.member = User.objects.get(pk=self.member.pk)
# Add a group to the user add_permissions()
self.group = Group.objects.create(name='Test Group') self.mumble_user = MumbleUser.objects.create(user=self.member)
self.user.groups.add(self.group)
self.user.save()
# Create a MumbleUser instance
self.mumble_user = MumbleUser.objects.create(
user=self.user,
username='john_mumble',
pwhash='dummyhash'
)
def test_mumble_user_str(self): def test_mumble_user_str(self):
""" """
@ -50,16 +52,6 @@ class MumbleUserTests(TestCase):
self.assertNotEqual(old_pwhash, self.mumble_user.pwhash) self.assertNotEqual(old_pwhash, self.mumble_user.pwhash)
self.assertTrue(self.mumble_user.credentials) # Should have 'username' & 'password' self.assertTrue(self.mumble_user.credentials) # Should have 'username' & 'password'
def test_update_password_custom(self):
"""
Test update_password with a custom password.
"""
old_pwhash = self.mumble_user.pwhash
self.mumble_user.update_password(password='myCustomPassword123')
self.assertNotEqual(old_pwhash, self.mumble_user.pwhash)
# After a custom password, credentials shouldn't be updated with 'password' key
self.assertFalse('password' in self.mumble_user.credentials)
def test_reset_password(self): def test_reset_password(self):
""" """
reset_password is basically an alias to update_password with no password argument. reset_password is basically an alias to update_password with no password argument.
@ -69,89 +61,6 @@ class MumbleUserTests(TestCase):
self.assertNotEqual(old_pwhash, self.mumble_user.pwhash) self.assertNotEqual(old_pwhash, self.mumble_user.pwhash)
self.assertTrue(self.mumble_user.credentials) self.assertTrue(self.mumble_user.credentials)
def test_group_string(self):
"""
Ensure group_string returns a comma separated list of groups
including the user.profile.state.name (if it exists).
For simplicity, we mock user.profile.state.name.
"""
with patch('django.contrib.auth.models.User.profile') as mock_profile:
mock_state = unittest.mock.Mock()
mock_state.name = 'Active'
mock_profile.state = mock_state
group_str = self.mumble_user.group_string()
# We expect something like "Active,<group(s)>"
self.assertIn('Active', group_str)
self.assertIn(self.group.name.replace(' ', '-'), group_str) # spaces replaced with '-'
def test_create_mumble_user_success(self):
"""
Test the create(...) method for MumbleUser.
We patch user.profile to simulate a main_character name.
"""
new_user = User.objects.create_user(
username='jane',
password='janepassword'
)
with patch('django.contrib.auth.models.User.profile') as mock_profile:
mock_profile.main_character.character_name = 'Jane Main'
# Attempt to create MumbleUser with .create()
result = self.mumble_user.create(new_user)
self.assertIsNot(result, False, "Expected a MumbleUser, not False")
# Check username was sanitized (spaces -> underscores) in get_username
self.assertEqual(result.username, 'Jane_Main')
# credentials should have username + generated password
self.assertIn('username', result.credentials)
self.assertIn('password', result.credentials)
def test_create_mumble_user_attribute_error(self):
"""
Test the create(...) methods exception branch
if the users profile or main_character is missing.
"""
new_user = User.objects.create_user(
username='jack',
password='jackpassword'
)
# In this scenario, 'profile' raises an AttributeError
with patch('django.contrib.auth.models.User.profile', side_effect=AttributeError):
result = self.mumble_user.create(new_user)
self.assertFalse(result, "Expected result to be False on error")
class TempUserTests(TestCase):
def setUp(self):
"""
Set up data for TempUser tests.
"""
self.temp_link = TempLink.objects.create(
expires=timezone.now() + timedelta(days=1),
link_ref="my123link"
)
self.temp_user = TempUser.objects.create(
name="GuestName",
username="Guest_123",
pwhash="dummyhash",
expires=timezone.now() + timedelta(days=1),
templink=self.temp_link
)
def test_temp_user_str(self):
"""
Verify the string representation for a TempUser.
"""
self.assertIn("Guest_123", str(self.temp_user))
self.assertIn("GuestName", str(self.temp_user))
def test_group_string(self):
"""
Overridden group_string from MumbleUser. Should return ["Guest"].
"""
group_str = self.temp_user.group_string()
self.assertIn("Guest", group_str)
class IdlerHandlerTests(TestCase): class IdlerHandlerTests(TestCase):
def setUp(self): def setUp(self):

View File

@ -50,7 +50,6 @@ class MumbleViewsTestCase(TestCase):
self.member.profile.main_character.character_name = "auth_member_updated" self.member.profile.main_character.character_name = "auth_member_updated"
self.member.profile.main_character.corporation_ticker = "TESTU" self.member.profile.main_character.corporation_ticker = "TESTU"
self.member.profile.main_character.save() self.member.profile.main_character.save()
mumble_user.update_display_name()
mumble_user = MumbleUser.objects.get(user=self.member) mumble_user = MumbleUser.objects.get(user=self.member)
expected_displayname = '[TESTU]auth_member_updated' expected_displayname = '[TESTU]auth_member_updated'
self.assertEqual(mumble_user.username, expected_username) self.assertEqual(mumble_user.username, expected_username)