mirror of
https://github.com/aljazceru/CTFd.git
synced 2025-12-17 05:54:19 +01:00
2.0.0 (#741)
* Fix user and admin panel user/team graphs * Closes #682 * Unify login and logout under specific functions * Closes #659 * Rename Challenges.hidden to Challenges.state * Start to clean up API and front end integration starting with profile updating * Slightly cleaner code * Clean API to respond with success, data, and status codes * Simpler COUNTRIES_LIST and update profile to use COUNTRIES_LIST * Lookup country code in users page. Update front end calls to get API data properly * Fix some API endpoints and fix JS to process new responses * Update config.py to support new values * Closes #635 * Update some code to handle user types, add email domain whitelisting * Write a logging wrapper * Use logging wrapper for submissions * Close #656 * Break up config.html to make it easier to maintain * Fix logging, domain_whitelist, and config * Improving views.py, starting to add Announcements * Starting announcements front end * Make it easier to see large images, clean up some more REST API differences * Closes #668 * Update Proxyfix config to REVERSE_PROXY * Add announcements front end * Move creation/edit modals into seperate files. Start moving user updating into their admin profile pages. * Update font-awesome to 5.4.1 * Switch to user-edit icon * Update the update_check function to send up more anonymous data for statistics purposes. * Start work on #640 * Add the user action modals and update API to fix responses * Fix admin teams page * Add challenge requirements * Implement anonymous locked challenges * Team editting from admin panel * Switch from simple cache to filesystem cache * Implements a Cache backed server side session (#658) and fixes Users editting endpoint * Add our messaging for docs * Closes #700 * Remove invalid import * Move challenge enditting around a whole lot and probably break a bunch of things * Show challenge names in prerequisites instead of challenge IDs * Closes #661 * Change user templates to use url_for * Remove extra function * Rewrite admin panel to use url_for * Fix events to work under subdirectories * Start cleaning up config panel * Fix filesystem uploader; deprecate view_challenges_unregistered, view_scoreboard_if_authed, prevent_registration, view_after_ctf; implement new visibility decorators * Remove workshop mode, fix some glitches with the new visibility settings * Fix ctf_logo on core theme * Fix setup errors * Removing default from get_config b/c of memoization issues and getting some tests working * Relax email regex validation rule (#693) * Update to pycodestyle and fix new lint errors * Add a ctf_id to update_check * Change challenge plugin layout. Rename mailgun configs to be more descriptive (Closes #702) * Detect if people try to set routes with '/' to simplify #690 * Closes #690 * Clean up some code * Clean up challenge submit to rate limit * Fix js version compatability issue * Close some TODOs * Hide challenges if not authenticated * Make set_config reset the cache for those config values * Return 404 on empty challenges for /api/v1/<challenge_id>/solves * Fix setting boolean configs * Properly change account config settings * Move datetimes to isoformat (Closes #703) * Remove all .isoformat() calls because it isn't UTC aware (ends in Z). Switch to isoformat function & filter * Make /v1/submissions endpoint work for admin submission creation * Make oauth_id unique for Users and Teams * Move challenge submission endpoint and implement mark solved. Fix some isoformat issues. * Only show team's missing challenges if in team mode * Adding support for Hints & Unlocks * Update challenge submission url * Fix encoding functions in Python3 * Fix hexencode in Python3 * Added functional tests for challenges API for non-admin users (#705) * Set hint default type to be standard * Fix some JS issues. Closes #704 * Implement session.regenerate on top of the CachingSessionInterface * Challenge challenge attempt responses from numbers to strings * Fix password updating for UserSchema * Remove leftover challenge submission code * Remove old migrations :(, resolve challenge requirements not loading correctly, move migration functions * Added functional tests for challenges/hints/admin API (#710) * Fix helpers and re-add JSONLite * Install MySQL 5.7 * Try more mysql * Update password for mysql * Fixing issuse in Users.get_solves * Add new import/export code * Switch to CTFdSerializer for Python 3 * Re-implement import exports and add a very flaky test * Redesign submissions API response * Get export to roundtrip in tests * Int score b/c Decimal is not JSON serializeable * Remove unused route methods * Fix POST /api/v1/configs and start adding admin tests * Add user_id and team_id to top/10 * Fix admin creating Teams * Fix Team website validation * Change admins_only to reply with a 403 if the request is JSON * Organize admin tests and fix authed_only to return 403 on unauthed * Adding check_account_visibility, check_score_visibility for /api/v1/teams/<team_id>/(solves|awards|fails) * Fix teams/me endpoints again * Fix users/me endpoints to return 403 if unauthed * Fix Python 3 config API * Add fetch and promise polyfills. (#712) * Add exec to docker-entrypoint.sh (#713) * Display import_ctf Exceptions via repr (#651) - Wraps exceptions on `/admin/import` returned to users in a `repr()`, making debugging easier. * Add error messages to the admin panel, fix schemas for users, start working on UI for imports/exports * Make unauthed challenge submission attempt return 403 instead of 302, Fix user deletion, fix associated tests, remove TODOs * Remove old means of creating solves * Remove most of the content from teams.js and users.js * Remove extra code from /challenges.js * Fix POST'ing & PATCH'ing pages * Make (users|teams)/fails return only count to users. Fix public score graphs to factor in awards * Fix admin side scoregraphs. Fix Awardschemas for admins * Add requirements to db migration * Adding some team decorators * Fix require_team_mode decorator * Make verified emails decorator return 403 on JSON requests * Redo initial revision * Add SQLiteJSON back * Adding ratelimit to /redirect and removing POST from /oauth * Fix PATCH tags * Actually fix PATCH tags * Simplify 500.html * Added tests for challenges, awards, files, flags, hints ... (#723) * Added tests for challenges, awards, files, flags, hints, notifications, pages, submissions, tags * Fix user data validation functions, Fix hidden challenges and include test * Add a locked state to attempt * OAuth teams get verified, use logging functions in redirect route * Removing extra print call * Update requirements.txt * Fix possible AttributeError * Start work on #716 * Closes #717 * Fix issue patching teams * Rename .j2 to .html, implement preview for challenges if admin * Move admin/challenge.html to admin/challenges/challenge.html * Remove old modals * Add Reset CTF button (#639) * Add Reset link to config.html * Delete Tracking * files handler should return a 404 on files it cant find * Denote official teams (#729), make scoregraph fill to zero * Remove old javascript files, make some challenge elements refresh by reloading * Fix team editting modals to work more reliably * Fix rendering of CTF paused * Remove hide_scores funtion and roll it into scores visibility * Log to stdout/stderr by default (#719) * Fix user searching * Remove searching for users/teams by country * Add badges to admin team and user pages, implement user banning (#643) * Remove shell.py, clean up admin team.html, add tests for banned users, teams * Start cleaning up dynamic_challenges to meet new challenge type plugin format * Remove POST method from teams.public * Add credentials: 'same-origin' to all fetch calls (#734) * Add challenge preview, add challenge deletion, fix file deletions when deleting challenges * Fix imports UI (#735) * Show prerequisites before adding a blank one (#738), Refresh all challenges after a submission (#739) * Admins can see hidden challenges * Fix some UI elements, fix loading location hash, set version to be 2.0.0 * Clean up some challenge plugin pages * Add default for flag type * Fix Python3 bytes/str issues * Add in MLC urls and support user mode for oauth * Fix seeing user graphs when scores are hidden, clean up setup.html, add links to MLC oauth * Add state parameter support * Use URLSafeTimedSerializer wrapper for sending token based emails * setting APPLICATION_ROOT from env var (#732) * Rearrange config.py and update README * Updating README
This commit is contained in:
519
tests/api/v1/test_challenges.py
Normal file
519
tests/api/v1/test_challenges.py
Normal file
@@ -0,0 +1,519 @@
|
||||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
from CTFd.utils import set_config
|
||||
from tests.helpers import *
|
||||
from freezegun import freeze_time
|
||||
|
||||
|
||||
def test_api_challenges_get_visibility_public():
|
||||
"""Can a public user get /api/v1/challenges if challenge_visibility is private/public"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
set_config('challenge_visibility', 'public')
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'private')
|
||||
r = client.get('/api/v1/challenges', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_get_ctftime_public():
|
||||
"""Can a public user get /api/v1/challenges if ctftime is over"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-7"):
|
||||
set_config('challenge_visibility', 'public')
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 200
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_get_visibility_private():
|
||||
"""Can a private user get /api/v1/challenges if challenge_visibility is private/public"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'public')
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_get_ctftime_private():
|
||||
"""Can a private user get /api/v1/challenges if ctftime is over"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-7"):
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 200
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
r = client.get('/api/v1/challenges')
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_get_verified_emails():
|
||||
"""Can a verified email user get /api/v1/challenges"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
set_config('verify_emails', True)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges', json="")
|
||||
assert r.status_code == 403
|
||||
gen_user(app.db, name='user_name', email='verified_user@ctfd.io', password='password', verified=True)
|
||||
registered_client = login_as_user(app, 'user_name', 'password')
|
||||
r = registered_client.get('/api/v1/challenges')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_post_non_admin():
|
||||
"""Can a user post /api/v1/challenges if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
with app.test_client() as client:
|
||||
r = client.post('/api/v1/challenges', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_post_admin():
|
||||
"""Can a user post /api/v1/challenges if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.post('/api/v1/challenges', json={
|
||||
"name": "chal",
|
||||
"category": "cate",
|
||||
"description": "desc",
|
||||
"value": "100",
|
||||
"state": "hidden",
|
||||
"type": "standard"})
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_types_post_non_admin():
|
||||
"""Can a non-admin get /api/v1/challenges/types if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/types', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_types_post_admin():
|
||||
"""Can an admin get /api/v1/challenges/types if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.get('/api/v1/challenges/types', json="")
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_visibility_public():
|
||||
"""Can a public user get /api/v1/challenges/<challenge_id> if challenge_visibility is private/public"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
set_config('challenge_visibility', 'public')
|
||||
with app.test_client() as client:
|
||||
gen_challenge(app.db)
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'private')
|
||||
r = client.get('/api/v1/challenges/1', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_ctftime_public():
|
||||
"""Can a public user get /api/v1/challenges/<challenge_id> if ctftime is over"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-7"):
|
||||
set_config('challenge_visibility', 'public')
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 200
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_visibility_private():
|
||||
"""Can a private user get /api/v1/challenges/<challenge_id> if challenge_visibility is private/public"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'public')
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_ctftime_private():
|
||||
"""Can a private user get /api/v1/challenges/<challenge_id> if ctftime is over"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-7"):
|
||||
gen_challenge(app.db)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 200
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_verified_emails():
|
||||
"""Can a verified email load /api/v1/challenges/<challenge_id>"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-5"):
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('verify_emails', True)
|
||||
gen_challenge(app.db)
|
||||
gen_user(app.db, name='user_name', email='verified_user@ctfd.io', password='password', verified=True)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
registered_client = login_as_user(app, 'user_name', 'password')
|
||||
r = client.get('/api/v1/challenges/1', json="")
|
||||
assert r.status_code == 403
|
||||
r = registered_client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_non_existing():
|
||||
"""Will a bad <challenge_id> at /api/v1/challenges/<challenge_id> 404"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-5"):
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges/1')
|
||||
assert r.status_code == 404
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_patch_non_admin():
|
||||
"""Can a user patch /api/v1/challenges/<challenge_id> if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.patch('/api/v1/challenges/1', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_patch_admin():
|
||||
"""Can a user patch /api/v1/challenges/<challenge_id> if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.patch('/api/v1/challenges/1', json={
|
||||
"name": "chal_name",
|
||||
"value": "200"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['value'] == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_delete_non_admin():
|
||||
"""Can a user delete /api/v1/challenges/<challenge_id> if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.delete('/api/v1/challenges/1', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_delete_admin():
|
||||
"""Can a user patch /api/v1/challenges/<challenge_id> if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.delete('/api/v1/challenges/1', json="")
|
||||
assert r.status_code == 200
|
||||
assert r.get_json().get('data') is None
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_attempt_post_public():
|
||||
"""Can a public user post /api/v1/challenges/attempt"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.post('/api/v1/challenges/attempt', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_attempt_post_private():
|
||||
"""Can an private user post /api/v1/challenges/attempt"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
gen_flag(app.db, 1)
|
||||
register_user(app)
|
||||
with login_as_user(app) as client:
|
||||
r = client.post('/api/v1/challenges/attempt', json={"challenge_id": 1, "submission": "wrong_flag"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['status'] == 'incorrect'
|
||||
r = client.post('/api/v1/challenges/attempt', json={"challenge_id": 1, "submission": "flag"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['status'] == 'correct'
|
||||
r = client.post('/api/v1/challenges/attempt', json={"challenge_id": 1, "submission": "flag"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['status'] == 'already_solved'
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_attempt_post_admin():
|
||||
"""Can an admin user post /api/v1/challenges/attempt"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
gen_flag(app.db, 1)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.post('/api/v1/challenges/attempt', json={"challenge_id": 1, "submission": "wrong_flag"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['status'] == 'incorrect'
|
||||
r = client.post('/api/v1/challenges/attempt', json={"challenge_id": 1, "submission": "flag"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['status'] == 'correct'
|
||||
r = client.post('/api/v1/challenges/attempt', json={"challenge_id": 1, "submission": "flag"})
|
||||
assert r.status_code == 200
|
||||
assert r.get_json()['data']['status'] == 'already_solved'
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_solves_visibility_public():
|
||||
"""Can a public user get /api/v1/challenges/<challenge_id>/solves if challenge_visibility is private/public"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
set_config('challenge_visibility', 'public')
|
||||
r = client.get('/api/v1/challenges/1/solves', json="")
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'private')
|
||||
r = client.get('/api/v1/challenges/1/solves', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_solves_ctftime_public():
|
||||
"""Can a public user get /api/v1/challenges/<challenge_id>/solves if ctftime is over"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-7"):
|
||||
set_config('challenge_visibility', 'public')
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
r = client.get('/api/v1/challenges/1/solves', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_solves_visibility_private():
|
||||
"""Can a private user get /api/v1/challenges/<challenge_id>/solves if challenge_visibility is private/public"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'public')
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_solves_ctftime_private():
|
||||
"""Can a private user get /api/v1/challenges/<challenge_id>/solves if ctftime is over"""
|
||||
app = create_ctfd()
|
||||
with app.app_context(), freeze_time("2017-10-7"):
|
||||
gen_challenge(app.db)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
set_config('start', '1507089600') # Wednesday, October 4, 2017 12:00:00 AM GMT-04:00 DST
|
||||
set_config('end', '1507262400') # Friday, October 6, 2017 12:00:00 AM GMT-04:00 DST
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_solves_verified_emails():
|
||||
"""Can a verified email get /api/v1/challenges/<challenge_id>/solves"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
set_config('verify_emails', True)
|
||||
gen_challenge(app.db)
|
||||
gen_user(app.db, name='user_name', email='verified_user@ctfd.io', password='password', verified=True)
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
registered_client = login_as_user(app, 'user_name', 'password')
|
||||
r = client.get('/api/v1/challenges/1/solves', json="")
|
||||
assert r.status_code == 403
|
||||
r = registered_client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenges_get_solves_score_visibility():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/solves if score_visibility is public/private/admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
set_config('challenge_visibility', 'public')
|
||||
set_config('score_visibility', 'public')
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
set_config('challenge_visibility', 'private')
|
||||
set_config('score_visibility', 'private')
|
||||
register_user(app)
|
||||
private_client = login_as_user(app)
|
||||
r = private_client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
set_config('score_visibility', 'admin')
|
||||
admin = login_as_user(app, 'admin', 'password')
|
||||
r = admin.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_solves_404():
|
||||
"""Will a bad <challenge_id> at /api/v1/challenges/<challenge_id>/solves 404"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
register_user(app)
|
||||
client = login_as_user(app)
|
||||
r = client.get('/api/v1/challenges/1/solves')
|
||||
assert r.status_code == 404
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_files_non_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/files if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1/files', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_files_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/files if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.get('/api/v1/challenges/1/files')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_tags_non_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/tags if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1/tags', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_tags_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/tags if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.get('/api/v1/challenges/1/tags')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_hints_non_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/hints if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1/hints', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_hints_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/hints if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.get('/api/v1/challenges/1/hints')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_flags_non_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/flags if not admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with app.test_client() as client:
|
||||
r = client.get('/api/v1/challenges/1/flags', json="")
|
||||
assert r.status_code == 403
|
||||
destroy_ctfd(app)
|
||||
|
||||
|
||||
def test_api_challenge_get_flags_admin():
|
||||
"""Can a user get /api/v1/challenges/<challenge_id>/flags if admin"""
|
||||
app = create_ctfd()
|
||||
with app.app_context():
|
||||
gen_challenge(app.db)
|
||||
with login_as_user(app, 'admin') as client:
|
||||
r = client.get('/api/v1/challenges/1/flags')
|
||||
assert r.status_code == 200
|
||||
destroy_ctfd(app)
|
||||
Reference in New Issue
Block a user