4 from xml.etree import ElementTree
 
   6 from cas_provider.attribute_formatters import CAS, NSMAP
 
   7 from cas_provider.models import ServiceTicket
 
   8 from cas_provider.views import _cas2_sucess_response, INVALID_TICKET, _cas2_error_response, generate_proxy_granting_ticket
 
   9 from django.contrib.auth.models import User, UserManager
 
  10 from django.core.urlresolvers import reverse
 
  11 from django.test import TestCase
 
  12 from urlparse import urlparse, parse_qsl, parse_qs
 
  13 from django.conf import settings
 
  18 dummy_urlopen_url = None
 
  21 def dummy_urlopen(url):
 
  22     cas_provider.tests.dummy_urlopen_url = url
 
  25 class ViewsTest(TestCase):
 
  27     fixtures = ['cas_users', ]
 
  32         self.service = 'http://example.com/'
 
  35     def test_successful_login_with_proxy(self):
 
  36         urllib2.urlopen = dummy_urlopen # monkey patching urllib2.urlopen so that the testcase doesnt really opens a url
 
  37         proxyTarget = "http://my.sweet.service"
 
  39         response = self._login_user('root', '123')
 
  40         response = self._validate_cas2(response, True, proxyTarget )
 
  42         # Test: I'm acting as the service that will call another service
 
  43         # Step 1: Get the proxy granting ticket
 
  44         responseXml = ElementTree.parse(StringIO.StringIO(response.content))
 
  45         auth_success = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
 
  46         pgt = auth_success.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
 
  47         user = auth_success.find(CAS + "user", namespaces=NSMAP)
 
  48         self.assertEqual('root', user.text)
 
  49         self.assertIsNotNone(pgt.text)
 
  50         self.assertTrue(pgt.text.startswith('PGTIOU'))
 
  52         #Step 2: Get the actual proxy ticket
 
  53         proxyTicketResponse = self.client.get(reverse('proxy'), {'targetService': proxyTarget, 'pgt': pgt.text}, follow=False)
 
  54         proxyTicketResponseXml = ElementTree.parse(StringIO.StringIO(proxyTicketResponse.content))
 
  55         self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess", namespaces=NSMAP))
 
  56         self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP))
 
  57         proxyTicket = proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP);
 
  59         #Step 3: I have the proxy ticket I can talk to some other backend service as the currently logged in user!
 
  60         proxyValidateResponse = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket.text, 'service': proxyTarget})
 
  61         proxyValidateResponseXml = ElementTree.parse(StringIO.StringIO(proxyValidateResponse.content))
 
  63         auth_success_2 = proxyValidateResponseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
 
  64         user_2 = auth_success.find(CAS + "user", namespaces=NSMAP)
 
  65         proxies_1  = auth_success_2.find(CAS + "proxies")
 
  66         self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket
 
  68         self.assertEqual(user.text, user_2.text)
 
  71     def test_successful_proxy_chaining(self):
 
  72         urllib2.urlopen = dummy_urlopen # monkey patching urllib2.urlopen so that the testcase doesnt really opens a url
 
  73         proxyTarget_1 = "http://my.sweet.service_1"
 
  74         proxyTarget_2 = "http://my.sweet.service_2"
 
  76         response = self._login_user('root', '123')
 
  77         response = self._validate_cas2(response, True, proxyTarget_1 )
 
  79         # Test: I'm acting as the service that will call another service
 
  80         # Step 1: Get the proxy granting ticket
 
  81         responseXml = ElementTree.parse(StringIO.StringIO(response.content))
 
  82         auth_success_1 = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
 
  83         pgt_1 = auth_success_1.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
 
  84         user_1 = auth_success_1.find(CAS + "user", namespaces=NSMAP)
 
  85         self.assertEqual('root', user_1.text)
 
  86         self.assertIsNotNone(pgt_1.text)
 
  87         self.assertTrue(pgt_1.text.startswith('PGTIOU'))
 
  89         #Step 2: Get the actual proxy ticket
 
  90         proxyTicketResponse_1 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_1, 'pgt': pgt_1.text}, follow=False)
 
  91         proxyTicketResponseXml_1 = ElementTree.parse(StringIO.StringIO(proxyTicketResponse_1.content))
 
  92         self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess", namespaces=NSMAP))
 
  93         self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP))
 
  94         proxyTicket_1 = proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP);
 
  96         #Step 3: I'm backend service 1 - I have the proxy ticket - I want to talk to back service 2
 
  98         proxyValidateResponse_1 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_1.text, 'service': proxyTarget_1, 'pgtUrl': proxyTarget_2})
 
  99         proxyValidateResponseXml_1 = ElementTree.parse(StringIO.StringIO(proxyValidateResponse_1.content))
 
 101         auth_success_2 = proxyValidateResponseXml_1.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
 
 102         user_2 = auth_success_2.find(CAS + "user", namespaces=NSMAP)
 
 104         proxies_1  = auth_success_2.find(CAS + "proxies")
 
 105         self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket
 
 106         self.assertIsNotNone(auth_success_2)
 
 107         self.assertEqual('root', user_2.text)
 
 109         pgt_2 = auth_success_2.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
 
 110         user = auth_success_2.find(CAS + "user", namespaces=NSMAP)
 
 111         self.assertEqual('root', user.text)
 
 112         self.assertIsNotNone(pgt_2.text)
 
 113         self.assertTrue(pgt_2.text.startswith('PGTIOU'))
 
 115         #Step 4: Get the second proxy ticket
 
 116         proxyTicketResponse_2 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_2, 'pgt': pgt_2.text})
 
 117         proxyTicketResponseXml_2 = ElementTree.parse(StringIO.StringIO(proxyTicketResponse_2.content))
 
 118         self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess", namespaces=NSMAP))
 
 119         self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP))
 
 120         proxyTicket_2 = proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)
 
 122         proxyValidateResponse_3 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_2.text, 'service': proxyTarget_2, 'pgtUrl': None})
 
 123         proxyValidateResponseXml_3 = ElementTree.parse(StringIO.StringIO(proxyValidateResponse_3.content))
 
 125         auth_success_3 = proxyValidateResponseXml_3.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
 
 126         user_3 = auth_success_3.find(CAS + "user", namespaces=NSMAP)
 
 128         proxies_3  = auth_success_3.find(CAS + "proxies")
 
 129         self.assertIsNotNone(proxies_3) # there should be a proxy. I am issued by a Proxy Ticket
 
 130         proxy_3 = proxies_3.find(CAS + "proxy", namespaces=NSMAP)
 
 131         self.assertEqual(proxyTarget_1, proxy_3.text )
 
 133         self.assertIsNotNone(auth_success_2)
 
 134         self.assertEqual('root', user_3.text)
 
 138     def test_successful_service_not_matching_in_request_to_proxy(self):
 
 139         urllib2.urlopen = dummy_urlopen # monkey patching urllib2.urlopen so that the testcase doesnt really opens a url
 
 140         proxyTarget_1 = "http://my.sweet.service"
 
 141         proxyTarget_2 = "http://my.malicious.service"
 
 143         response = self._login_user('root', '123')
 
 144         response = self._validate_cas2(response, True, proxyTarget_1 )
 
 146         # Test: I'm acting as the service that will call another service
 
 147         # Step 1: Get the proxy granting ticket
 
 148         responseXml = ElementTree.parse(StringIO.StringIO(response.content))
 
 149         auth_success = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
 
 150         pgt = auth_success.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
 
 151         user = auth_success.find(CAS + "user", namespaces=NSMAP)
 
 152         self.assertEqual('root', user.text)
 
 153         self.assertIsNotNone(pgt.text)
 
 154         self.assertTrue(pgt.text.startswith('PGTIOU'))
 
 156         #Step 2: Get the actual proxy ticket
 
 157         proxyTicketResponse = self.client.get(reverse('proxy'), {'targetService': proxyTarget_2, 'pgt': pgt.text}, follow=False)
 
 158         proxyTicketResponseXml = ElementTree.parse(StringIO.StringIO(proxyTicketResponse.content))
 
 159         self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "authenticationFailure", namespaces=NSMAP))
 
 162     def test_succeessful_login(self):
 
 163         response = self._login_user('root', '123')
 
 164         self._validate_cas1(response, True)
 
 166         response = self.client.get(reverse('cas_login'), {'service': self.service}, follow=False)
 
 167         self.assertEqual(response.status_code, 302)
 
 168         self.assertTrue(response['location'].startswith('%s?ticket=' % self.service))
 
 170         response = self.client.get(reverse('cas_login'), follow=False)
 
 171         self.assertEqual(response.status_code, 302)
 
 172         self.assertTrue(response['location'].startswith('http://testserver/'))
 
 174         response = self.client.get(response['location'], follow=False)
 
 175         self.assertIn(response.status_code, [302, 200])
 
 177         response = self.client.get(reverse('cas_login'), {'service': self.service, 'warn': True}, follow=False)
 
 178         self.assertEqual(response.status_code, 200)
 
 179         self.assertTemplateUsed(response, 'cas/warn.html')
 
 182     def _cas_logout(self):
 
 183         response = self.client.get(reverse('cas_logout'), follow=False)
 
 184         self.assertEqual(response.status_code, 200)
 
 187     def test_logout(self):
 
 188         response = self._login_user('root', '123')
 
 189         self._validate_cas1(response, True)
 
 193         response = self.client.get(reverse('cas_login'), follow=False)
 
 194         self.assertEqual(response.status_code, 200)
 
 195         self.assertEqual(response.context['user'].is_anonymous(), True)
 
 198     def test_broken_pwd(self):
 
 199         self._fail_login('root', '321')
 
 201     def test_broken_username(self):
 
 202         self._fail_login('notroot', '123')
 
 204     def test_nonactive_user_login(self):
 
 205         self._fail_login('nonactive', '123')
 
 207     def test_cas2_success_validate(self):
 
 208         response = self._login_user('root', '123')
 
 209         response = self._validate_cas2(response, True)
 
 210         user = User.objects.get(username=self.username)
 
 211         self.assertEqual(response.content, _cas2_sucess_response(user).content)
 
 213     def test_cas2_custom_attrs(self):
 
 214         settings.CAS_CUSTOM_ATTRIBUTES_CALLBACK = cas_mapping
 
 215         response = self._login_user('editor', '123')
 
 217         response = self._validate_cas2(response, True)
 
 218         self.assertEqual(response.content, '''<cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">'''
 
 219                                            '''<cas:authenticationSuccess>'''
 
 220                                            '''<cas:user>editor</cas:user>'''
 
 221                                            '''<cas:attributes>'''
 
 222                                            '''<cas:attraStyle>Jasig</cas:attraStyle>'''
 
 223                                            '''<cas:group>editor</cas:group>'''
 
 224                                            '''<cas:is_staff>True</cas:is_staff>'''
 
 225                                            '''<cas:is_active>True</cas:is_active>'''
 
 226                                            '''<cas:email>editor@exapmle.com</cas:email>'''
 
 227                                            '''</cas:attributes>'''
 
 228                                            '''</cas:authenticationSuccess>'''
 
 229                                            '''</cas:serviceResponse>''')
 
 232         response = self._login_user('editor', '123')
 
 233         settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.ruby_cas'
 
 234         response = self._validate_cas2(response, True)
 
 235         self.assertEqual(response.content, '''<cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">'''
 
 236                                            '''<cas:authenticationSuccess>'''
 
 237                                            '''<cas:user>editor</cas:user>'''
 
 238                                            '''<cas:attraStyle>RubyCAS</cas:attraStyle>'''
 
 239                                            '''<cas:group>editor</cas:group>'''
 
 240                                            '''<cas:is_staff>True</cas:is_staff>'''
 
 241                                            '''<cas:is_active>True</cas:is_active>'''
 
 242                                            '''<cas:email>editor@exapmle.com</cas:email>'''
 
 243                                            '''</cas:authenticationSuccess>'''
 
 244                                            '''</cas:serviceResponse>''')
 
 247         response = self._login_user('editor', '123')
 
 248         settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.name_value'
 
 249         response = self._validate_cas2(response, True)
 
 250         self.assertEqual(response.content, '''<cas:serviceResponse xmlns:cas="http://www.yale.edu/tp/cas">'''
 
 251                                            '''<cas:authenticationSuccess>'''
 
 252                                            '''<cas:user>editor</cas:user>'''
 
 253                                            '''<cas:attribute name="attraStyle" value="Name-Value"/>'''
 
 254                                            '''<cas:attribute name="group" value="editor"/>'''
 
 255                                            '''<cas:attribute name="is_staff" value="True"/>'''
 
 256                                            '''<cas:attribute name="is_active" value="True"/>'''
 
 257                                            '''<cas:attribute name="email" value="editor@exapmle.com"/>'''
 
 258                                            '''</cas:authenticationSuccess>'''
 
 259                                            '''</cas:serviceResponse>''')
 
 262     def test_cas2_fail_validate(self):
 
 263         for user, pwd in (('root', '321'), ('notroot', '123'), ('nonactive', '123')):
 
 264             response = self._login_user(user, pwd)
 
 265             self._validate_cas2(response, False)
 
 268     def test_generate_proxy_granting_ticket(self):
 
 269         urllib2.urlopen = dummy_urlopen # monkey patching urllib2.urlopen so that the testcase doesnt really opens a url
 
 270         url = 'http://my.call.back/callhere'
 
 272         user = User.objects.get(username = 'root')
 
 273         st = ServiceTicket.objects.create(user = user )
 
 274         pgt = generate_proxy_granting_ticket(url, st)
 
 275         self.assertIsNotNone(pgt)
 
 277         calledUrl = cas_provider.tests.dummy_urlopen_url
 
 278         parsedUrl = urlparse(calledUrl)
 
 279         params = parse_qs(parsedUrl.query)
 
 280         self.assertIsNotNone(params['pgtId'])
 
 281         self.assertIsNotNone(params['pgtIou'])
 
 285     def _fail_login(self, username, password):
 
 286         response = self._login_user(username, password)
 
 287         self._validate_cas1(response, False)
 
 289         response = self.client.get(reverse('cas_login'), {'service': self.service}, follow=False)
 
 290         self.assertEqual(response.status_code, 200)
 
 291         response = self.client.get(reverse('cas_login'), follow=False)
 
 292         self.assertEqual(response.status_code, 200)
 
 296     def _login_user(self, username, password):
 
 297         self.username = username
 
 298         response = self.client.get(reverse('cas_login'), {'service': self.service})
 
 299         self.assertEqual(response.status_code, 200)
 
 300         self.assertTemplateUsed(response, 'cas/login.html')
 
 301         form = response.context['form']
 
 302         service = form['service'].value()
 
 303         return self.client.post(reverse('cas_login'), {
 
 304             'username': username,
 
 305             'password': password,
 
 306             'lt': form['lt'].value(),
 
 311     def _validate_cas1(self, response, is_correct=True):
 
 313             self.assertEqual(response.status_code, 302)
 
 314             self.assertTrue(response.has_header('location'))
 
 315             location = urlparse(response['location'])
 
 316             ticket = location.query.split('=')[1]
 
 318             response = self.client.get(reverse('cas_validate'), {'ticket': ticket, 'service': self.service}, follow=False)
 
 319             self.assertEqual(response.status_code, 200)
 
 320             self.assertEqual(unicode(response.content), u'yes\n%s\n' % self.username)
 
 322             self.assertEqual(response.status_code, 200)
 
 323             self.assertEqual(len(response.context['form'].errors), 1)
 
 325             response = self.client.get(reverse('cas_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False)
 
 326             self.assertEqual(response.status_code, 200)
 
 327             self.assertEqual(response.content, u'no\n\n')
 
 330     def _validate_cas2(self, response, is_correct=True, pgtUrl = None):
 
 332             self.assertEqual(response.status_code, 302)
 
 333             self.assertTrue(response.has_header('location'))
 
 334             location = urlparse(response['location'])
 
 335             ticket = location.query.split('=')[1]
 
 337                 response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service, 'pgtUrl': pgtUrl}, follow=False)
 
 339                 response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service}, follow=False)
 
 340             self.assertEqual(response.status_code, 200)
 
 342             self.assertEqual(response.status_code, 200)
 
 343             self.assertEqual(len(response.context['form'].errors), 1)
 
 345             response = self.client.get(reverse('cas_service_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False)
 
 346             self.assertEqual(response.status_code, 200)
 
 347             self.assertEqual(response.content, _cas2_error_response(INVALID_TICKET).content)
 
 350 class ModelsTestCase(TestCase):
 
 352     fixtures = ['cas_users.json', ]
 
 355         self.user = User.objects.get(username='root')
 
 357     def test_redirects(self):
 
 358         ticket = ServiceTicket.objects.create(service='http://example.com', user=self.user)
 
 359         self.assertEqual(ticket.get_redirect_url(), '%(service)s?ticket=%(ticket)s' % ticket.__dict__)
 
 362 def cas_mapping(user):
 
 364         'is_staff': unicode(user.is_staff),
 
 365         'is_active': unicode(user.is_active),
 
 367         'group': [g.name for g in user.groups.all()]