Revision 8fb8d0cf snf-astakos-app/astakos/im/tests/auth.py
b/snf-astakos-app/astakos/im/tests/auth.py | ||
---|---|---|
313 | 313 |
# we can reenable the local provider by setting a password |
314 | 314 |
r = client.get(ui_url("password_change"), follow=True) |
315 | 315 |
r = client.post(ui_url("password_change"), {'new_password1': '111', |
316 |
'new_password2': '111'}, |
|
316 |
'new_password2': '111'},
|
|
317 | 317 |
follow=True) |
318 | 318 |
user = r.context['request'].user |
319 | 319 |
self.assertTrue(user.has_auth_provider('local')) |
... | ... | |
444 | 444 |
# admin gets notified and activates the user from the command line |
445 | 445 |
self.assertEqual(len(get_mailbox('kpap@synnefo.org')), 1) |
446 | 446 |
r = self.client.post(ui_url('local'), {'username': 'kpap@synnefo.org', |
447 |
'password': 'password'}, |
|
447 |
'password': 'password'},
|
|
448 | 448 |
follow=True) |
449 | 449 |
self.assertContains(r, messages.VERIFICATION_SENT) |
450 | 450 |
backend = activation_backends.get_backend() |
... | ... | |
919 | 919 |
provider.add_to_user() |
920 | 920 |
user = AstakosUser.objects.get() |
921 | 921 |
self.assertEqual(sorted(user.groups.values_list('name', flat=True)), |
922 |
sorted([u'group1', u'group2', u'group-create']))
|
|
922 |
sorted([u'group1', u'group2', u'group-create'])) |
|
923 | 923 |
|
924 | 924 |
local = auth.get_provider('local', user) |
925 | 925 |
local.add_to_user() |
... | ... | |
929 | 929 |
user = AstakosUser.objects.get() |
930 | 930 |
self.assertEqual(len(user.get_auth_providers()), 1) |
931 | 931 |
self.assertEqual(sorted(user.groups.values_list('name', flat=True)), |
932 |
sorted([u'group-create', u'localgroup']))
|
|
932 |
sorted([u'group-create', u'localgroup'])) |
|
933 | 933 |
|
934 | 934 |
local = user.get_auth_provider('local') |
935 | 935 |
self.assertRaises(Exception, local.remove_from_user) |
... | ... | |
937 | 937 |
provider.add_to_user() |
938 | 938 |
user = AstakosUser.objects.get() |
939 | 939 |
self.assertEqual(sorted(user.groups.values_list('name', flat=True)), |
940 |
sorted([u'group-create', u'group1', u'group2',
|
|
941 |
u'localgroup'])) |
|
940 |
sorted([u'group-create', u'group1', u'group2', |
|
941 |
u'localgroup']))
|
|
942 | 942 |
Group.objects.all().delete() |
943 | 943 |
|
944 |
|
|
945 |
|
|
946 | 944 |
@im_settings(IM_MODULES=['local', 'shibboleth']) |
947 | 945 |
def test_policies(self): |
948 | 946 |
group_old, created = Group.objects.get_or_create(name='olduser') |
... | ... | |
1021 | 1019 |
'GOOGLE_ADD_GROUPS_POLICY']: |
1022 | 1020 |
delattr(settings, 'ASTAKOS_AUTH_PROVIDER_%s' % s) |
1023 | 1021 |
|
1024 |
|
|
1025 | 1022 |
@shibboleth_settings(CREATE_POLICY=True) |
1026 | 1023 |
@im_settings(IM_MODULES=['local', 'shibboleth']) |
1027 | 1024 |
def test_create_http(self): |
... | ... | |
1042 | 1039 |
provider = auth_providers.get_provider('shibboleth', user, |
1043 | 1040 |
'test@shibboleth.com', |
1044 | 1041 |
**{'info': {'name': |
1045 |
'User Test'}})
|
|
1042 |
'User Test'}}) |
|
1046 | 1043 |
self.assertFalse(provider.get_create_policy) |
1047 | 1044 |
settings.ASTAKOS_AUTH_PROVIDER_SHIBBOLETH_CREATE_POLICY = True |
1048 | 1045 |
self.assertTrue(provider.get_create_policy) |
... | ... | |
1318 | 1315 |
invalid_domain = weblogin("https://www.invaliddomain.synnefo.org") |
1319 | 1316 |
invalid_scheme = weblogin("customscheme://localhost") |
1320 | 1317 |
invalid_scheme_with_valid_domain = \ |
1321 |
weblogin("http://www.invaliddomain.com")
|
|
1318 |
weblogin("http://www.invaliddomain.com") |
|
1322 | 1319 |
valid_scheme = weblogin("pithos://localhost/") |
1323 | 1320 |
# to be used in assertRedirects |
1324 | 1321 |
valid_scheme_quoted = weblogin_quoted("pithos://localhost/") |
Also available in: Unified diff