existing test all passing now
This commit is contained in:
parent
fa7232913c
commit
7a98eb73d9
28
mediagoblin/tests/basic_auth_appconfig.ini
Normal file
28
mediagoblin/tests/basic_auth_appconfig.ini
Normal file
@ -0,0 +1,28 @@
|
||||
[mediagoblin]
|
||||
direct_remote_path = /test_static/
|
||||
email_sender_address = "notice@mediagoblin.example.org"
|
||||
email_debug_mode = true
|
||||
no_auth = false
|
||||
|
||||
# TODO: Switch to using an in-memory database
|
||||
sql_engine = "sqlite:///%(here)s/test_user_dev/mediagoblin.db"
|
||||
|
||||
# Celery shouldn't be set up by the application as it's setup via
|
||||
# mediagoblin.init.celery.from_celery
|
||||
celery_setup_elsewhere = true
|
||||
|
||||
[storage:publicstore]
|
||||
base_dir = %(here)s/test_user_dev/media/public
|
||||
base_url = /mgoblin_media/
|
||||
|
||||
[storage:queuestore]
|
||||
base_dir = %(here)s/test_user_dev/media/queue
|
||||
|
||||
[celery]
|
||||
CELERY_ALWAYS_EAGER = true
|
||||
CELERY_RESULT_DBURI = "sqlite:///%(here)s/test_user_dev/celery.db"
|
||||
BROKER_HOST = "sqlite:///%(here)s/test_user_dev/kombu.db"
|
||||
|
||||
[plugins]
|
||||
[[mediagoblin.plugins.basic_auth]]
|
||||
|
@ -15,54 +15,13 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
import urlparse
|
||||
import datetime
|
||||
|
||||
from mediagoblin import mg_globals
|
||||
from mediagoblin.auth import lib as auth_lib
|
||||
from mediagoblin.db.models import User
|
||||
from mediagoblin.tests.tools import fixture_add_user
|
||||
from mediagoblin.tools import template, mail
|
||||
|
||||
|
||||
########################
|
||||
# Test bcrypt auth funcs
|
||||
########################
|
||||
|
||||
def test_bcrypt_check_password():
|
||||
# Check known 'lollerskates' password against check function
|
||||
assert auth_lib.bcrypt_check_password(
|
||||
'lollerskates',
|
||||
'$2a$12$PXU03zfrVCujBhVeICTwtOaHTUs5FFwsscvSSTJkqx/2RQ0Lhy/nO')
|
||||
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword',
|
||||
'$2a$12$PXU03zfrVCujBhVeICTwtOaHTUs5FFwsscvSSTJkqx/2RQ0Lhy/nO')
|
||||
|
||||
# Same thing, but with extra fake salt.
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword',
|
||||
'$2a$12$ELVlnw3z1FMu6CEGs/L8XO8vl0BuWSlUHgh0rUrry9DUXGMUNWwl6',
|
||||
'3><7R45417')
|
||||
|
||||
|
||||
def test_bcrypt_gen_password_hash():
|
||||
pw = 'youwillneverguessthis'
|
||||
|
||||
# Normal password hash generation, and check on that hash
|
||||
hashed_pw = auth_lib.bcrypt_gen_password_hash(pw)
|
||||
assert auth_lib.bcrypt_check_password(
|
||||
pw, hashed_pw)
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword', hashed_pw)
|
||||
|
||||
# Same thing, extra salt.
|
||||
hashed_pw = auth_lib.bcrypt_gen_password_hash(pw, '3><7R45417')
|
||||
assert auth_lib.bcrypt_check_password(
|
||||
pw, hashed_pw, '3><7R45417')
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword', hashed_pw, '3><7R45417')
|
||||
|
||||
|
||||
def test_register_views(test_app):
|
||||
"""
|
||||
Massive test function that all our registration-related views all work.
|
||||
@ -210,86 +169,6 @@ def test_register_views(test_app):
|
||||
|
||||
## TODO: Also check for double instances of an email address?
|
||||
|
||||
### Oops, forgot the password
|
||||
# -------------------
|
||||
template.clear_test_template_context()
|
||||
response = test_app.post(
|
||||
'/auth/forgot_password/',
|
||||
{'username': u'happygirl'})
|
||||
response.follow()
|
||||
|
||||
## Did we redirect to the proper page? Use the right template?
|
||||
assert urlparse.urlsplit(response.location)[2] == '/auth/login/'
|
||||
assert 'mediagoblin/auth/login.html' in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
## Make sure link to change password is sent by email
|
||||
assert len(mail.EMAIL_TEST_INBOX) == 1
|
||||
message = mail.EMAIL_TEST_INBOX.pop()
|
||||
assert message['To'] == 'happygrrl@example.org'
|
||||
email_context = template.TEMPLATE_TEST_CONTEXT[
|
||||
'mediagoblin/auth/fp_verification_email.txt']
|
||||
#TODO - change the name of verification_url to something forgot-password-ish
|
||||
assert email_context['verification_url'] in message.get_payload(decode=True)
|
||||
|
||||
path = urlparse.urlsplit(email_context['verification_url'])[2]
|
||||
get_params = urlparse.urlsplit(email_context['verification_url'])[3]
|
||||
assert path == u'/auth/forgot_password/verify/'
|
||||
parsed_get_params = urlparse.parse_qs(get_params)
|
||||
|
||||
# user should have matching parameters
|
||||
new_user = mg_globals.database.User.find_one({'username': u'happygirl'})
|
||||
assert parsed_get_params['userid'] == [unicode(new_user.id)]
|
||||
assert parsed_get_params['token'] == [new_user.fp_verification_key]
|
||||
|
||||
### The forgotten password token should be set to expire in ~ 10 days
|
||||
# A few ticks have expired so there are only 9 full days left...
|
||||
assert (new_user.fp_token_expire - datetime.datetime.now()).days == 9
|
||||
|
||||
## Try using a bs password-changing verification key, shouldn't work
|
||||
template.clear_test_template_context()
|
||||
response = test_app.get(
|
||||
"/auth/forgot_password/verify/?userid=%s&token=total_bs" % unicode(
|
||||
new_user.id), status=404)
|
||||
assert response.status.split()[0] == u'404' # status="404 NOT FOUND"
|
||||
|
||||
## Try using an expired token to change password, shouldn't work
|
||||
template.clear_test_template_context()
|
||||
new_user = mg_globals.database.User.find_one({'username': u'happygirl'})
|
||||
real_token_expiration = new_user.fp_token_expire
|
||||
new_user.fp_token_expire = datetime.datetime.now()
|
||||
new_user.save()
|
||||
response = test_app.get("%s?%s" % (path, get_params), status=404)
|
||||
assert response.status.split()[0] == u'404' # status="404 NOT FOUND"
|
||||
new_user.fp_token_expire = real_token_expiration
|
||||
new_user.save()
|
||||
|
||||
## Verify step 1 of password-change works -- can see form to change password
|
||||
template.clear_test_template_context()
|
||||
response = test_app.get("%s?%s" % (path, get_params))
|
||||
assert 'mediagoblin/auth/change_fp.html' in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
## Verify step 2.1 of password-change works -- report success to user
|
||||
template.clear_test_template_context()
|
||||
response = test_app.post(
|
||||
'/auth/forgot_password/verify/', {
|
||||
'userid': parsed_get_params['userid'],
|
||||
'password': 'iamveryveryhappy',
|
||||
'token': parsed_get_params['token']})
|
||||
response.follow()
|
||||
assert 'mediagoblin/auth/login.html' in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
## Verify step 2.2 of password-change works -- login w/ new password success
|
||||
template.clear_test_template_context()
|
||||
response = test_app.post(
|
||||
'/auth/login/', {
|
||||
'username': u'happygirl',
|
||||
'password': 'iamveryveryhappy'})
|
||||
|
||||
# User should be redirected
|
||||
response.follow()
|
||||
assert urlparse.urlsplit(response.location)[2] == '/'
|
||||
assert 'mediagoblin/root.html' in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
|
||||
def test_authentication_views(test_app):
|
||||
"""
|
||||
|
166
mediagoblin/tests/test_basic_auth.py
Normal file
166
mediagoblin/tests/test_basic_auth.py
Normal file
@ -0,0 +1,166 @@
|
||||
# GNU MediaGoblin -- federated, autonomous media hosting
|
||||
# Copyright (C) 2011, 2012 MediaGoblin contributors. See AUTHORS.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Affero General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Affero General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU Affero General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
import urlparse
|
||||
import datetime
|
||||
import pkg_resources
|
||||
import pytest
|
||||
|
||||
from mediagoblin.plugins.basic_auth import lib as auth_lib
|
||||
from mediagoblin import mg_globals
|
||||
from mediagoblin.tools import template, mail
|
||||
from mediagoblin.tests.tools import get_app, fixture_add_user
|
||||
from mediagoblin.tools.testing import _activate_testing
|
||||
|
||||
_activate_testing()
|
||||
|
||||
|
||||
########################
|
||||
# Test bcrypt auth funcs
|
||||
########################
|
||||
|
||||
|
||||
def test_bcrypt_check_password():
|
||||
# Check known 'lollerskates' password against check function
|
||||
assert auth_lib.bcrypt_check_password(
|
||||
'lollerskates',
|
||||
'$2a$12$PXU03zfrVCujBhVeICTwtOaHTUs5FFwsscvSSTJkqx/2RQ0Lhy/nO')
|
||||
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword',
|
||||
'$2a$12$PXU03zfrVCujBhVeICTwtOaHTUs5FFwsscvSSTJkqx/2RQ0Lhy/nO')
|
||||
|
||||
# Same thing, but with extra fake salt.
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword',
|
||||
'$2a$12$ELVlnw3z1FMu6CEGs/L8XO8vl0BuWSlUHgh0rUrry9DUXGMUNWwl6',
|
||||
'3><7R45417')
|
||||
|
||||
|
||||
def test_bcrypt_gen_password_hash():
|
||||
pw = 'youwillneverguessthis'
|
||||
|
||||
# Normal password hash generation, and check on that hash
|
||||
hashed_pw = auth_lib.bcrypt_gen_password_hash(pw)
|
||||
assert auth_lib.bcrypt_check_password(
|
||||
pw, hashed_pw)
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword', hashed_pw)
|
||||
|
||||
# Same thing, extra salt.
|
||||
hashed_pw = auth_lib.bcrypt_gen_password_hash(pw, '3><7R45417')
|
||||
assert auth_lib.bcrypt_check_password(
|
||||
pw, hashed_pw, '3><7R45417')
|
||||
assert not auth_lib.bcrypt_check_password(
|
||||
'notthepassword', hashed_pw, '3><7R45417')
|
||||
|
||||
|
||||
@pytest.fixture()
|
||||
def context_modified_app(request):
|
||||
return get_app(
|
||||
request,
|
||||
mgoblin_config=pkg_resources.resource_filename(
|
||||
'mediagoblin.tests', 'basic_auth_appconfig.ini'))
|
||||
|
||||
|
||||
def test_fp_view(context_modified_app):
|
||||
### Oops, forgot the password
|
||||
# -------------------
|
||||
## Register a user
|
||||
fixture_add_user(active_user=True)
|
||||
|
||||
template.clear_test_template_context()
|
||||
response = context_modified_app.post(
|
||||
'/auth/forgot_password/',
|
||||
{'username': u'chris'})
|
||||
response.follow()
|
||||
|
||||
## Did we redirect to the proper page? Use the right template?
|
||||
assert urlparse.urlsplit(response.location)[2] == '/auth/login/'
|
||||
assert 'mediagoblin/auth/login.html' in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
## Make sure link to change password is sent by email
|
||||
assert len(mail.EMAIL_TEST_INBOX) == 1
|
||||
message = mail.EMAIL_TEST_INBOX.pop()
|
||||
assert message['To'] == 'chris@example.com'
|
||||
email_context = template.TEMPLATE_TEST_CONTEXT[
|
||||
'mediagoblin/auth/fp_verification_email.txt']
|
||||
#TODO - change the name of verification_url to something
|
||||
# forgot-password-ish
|
||||
assert email_context['verification_url'] in \
|
||||
message.get_payload(decode=True)
|
||||
|
||||
path = urlparse.urlsplit(email_context['verification_url'])[2]
|
||||
get_params = urlparse.urlsplit(email_context['verification_url'])[3]
|
||||
assert path == u'/auth/forgot_password/verify/'
|
||||
parsed_get_params = urlparse.parse_qs(get_params)
|
||||
|
||||
# user should have matching parameters
|
||||
new_user = mg_globals.database.User.find_one({'username': u'chris'})
|
||||
assert parsed_get_params['userid'] == [unicode(new_user.id)]
|
||||
assert parsed_get_params['token'] == [new_user.fp_verification_key]
|
||||
|
||||
### The forgotten password token should be set to expire in ~ 10 days
|
||||
# A few ticks have expired so there are only 9 full days left...
|
||||
assert (new_user.fp_token_expire - datetime.datetime.now()).days == 9
|
||||
|
||||
## Try using a bs password-changing verification key, shouldn't work
|
||||
template.clear_test_template_context()
|
||||
response = context_modified_app.get(
|
||||
"/auth/forgot_password/verify/?userid=%s&token=total_bs" % unicode(
|
||||
new_user.id), status=404)
|
||||
assert response.status.split()[0] == u'404' # status="404 NOT FOUND"
|
||||
|
||||
## Try using an expired token to change password, shouldn't work
|
||||
template.clear_test_template_context()
|
||||
new_user = mg_globals.database.User.find_one({'username': u'chris'})
|
||||
real_token_expiration = new_user.fp_token_expire
|
||||
new_user.fp_token_expire = datetime.datetime.now()
|
||||
new_user.save()
|
||||
response = context_modified_app.get("%s?%s" % (path, get_params),
|
||||
status=404)
|
||||
assert response.status.split()[0] == u'404' # status="404 NOT FOUND"
|
||||
new_user.fp_token_expire = real_token_expiration
|
||||
new_user.save()
|
||||
|
||||
## Verify step 1 of password-change works -- can see form to
|
||||
## change password
|
||||
template.clear_test_template_context()
|
||||
response = context_modified_app.get("%s?%s" % (path, get_params))
|
||||
assert 'mediagoblin/plugins/basic_auth/change_fp.html' \
|
||||
in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
## Verify step 2.1 of password-change works -- report success to user
|
||||
template.clear_test_template_context()
|
||||
response = context_modified_app.post(
|
||||
'/auth/forgot_password/verify/', {
|
||||
'userid': parsed_get_params['userid'],
|
||||
'password': 'iamveryveryhappy',
|
||||
'token': parsed_get_params['token']})
|
||||
response.follow()
|
||||
assert 'mediagoblin/auth/login.html' in template.TEMPLATE_TEST_CONTEXT
|
||||
|
||||
## Verify step 2.2 of password-change works -- login w/ new password
|
||||
## success
|
||||
template.clear_test_template_context()
|
||||
response = context_modified_app.post(
|
||||
'/auth/login/', {
|
||||
'username': u'chris',
|
||||
'password': 'iamveryveryhappy'})
|
||||
|
||||
# User should be redirected
|
||||
response.follow()
|
||||
assert urlparse.urlsplit(response.location)[2] == '/'
|
||||
assert 'mediagoblin/root.html' in template.TEMPLATE_TEST_CONTEXT
|
Loading…
x
Reference in New Issue
Block a user