X-Git-Url: https://git.mdrn.pl/django-cas-provider.git/blobdiff_plain/fdd4b59a0a825cf8fa38e94123d118b57707b067..243a932dd7165b4dbe5d8938f622450b4b7cdaa3:/cas_provider/tests.py?ds=inline
diff --git a/cas_provider/tests.py b/cas_provider/tests.py
index 4b486de..2f87330 100644
--- a/cas_provider/tests.py
+++ b/cas_provider/tests.py
@@ -1,21 +1,155 @@
+from __future__ import unicode_literals
+from io import StringIO
+from xml import etree
+from xml.etree import ElementTree
+import cas_provider
+from cas_provider.attribute_formatters import CAS, NSMAP
from cas_provider.models import ServiceTicket
-from cas_provider.views import _cas2_sucess_response, _cas2_error_response, \
- INVALID_TICKET
-from django.contrib.auth.models import User
+from cas_provider.signals import cas_collect_custom_attributes
+from cas_provider.views import _cas2_sucess_response, INVALID_TICKET, _cas2_error_response, generate_proxy_granting_ticket
+from django.contrib.auth.models import User, UserManager
from django.core.urlresolvers import reverse
from django.test import TestCase
-from urlparse import urlparse
from django.conf import settings
+try:
+ from urllib.parse import urlparse, parse_qsl, parse_qs
+ from urllib.request import install_opener
+except:
+ from urlparse import urlparse, parse_qsl, parse_qs
+ from urllib2 import install_opener
+
+
+
+
+class DummyOpener(object):
+ url = None
+
+ @staticmethod
+ def open(url, *args, **kwargs):
+ DummyOpener.url = url
+
class ViewsTest(TestCase):
- fixtures = ['cas_users.json', ]
+ fixtures = ['cas_users', ]
+
+
def setUp(self):
self.service = 'http://example.com/'
+ def test_successful_login_with_proxy(self):
+ install_opener(DummyOpener) # Don't really open any URLs
+ proxyTarget = "http://my.sweet.service"
+
+ response = self._login_user('root', '123')
+ response = self._validate_cas2(response, True, proxyTarget )
+
+ # Test: I'm acting as the service that will call another service
+ # Step 1: Get the proxy granting ticket
+ responseXml = ElementTree.parse(StringIO(response.content.decode('utf-8')))
+ auth_success = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
+ pgt = auth_success.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
+ user = auth_success.find(CAS + "user", namespaces=NSMAP)
+ self.assertEqual('root', user.text)
+ self.assertIsNotNone(pgt.text)
+ self.assertTrue(pgt.text.startswith('PGTIOU'))
+
+ pgtId = parse_qs(urlparse(DummyOpener.url).query)['pgtId']
+
+ #Step 2: Get the actual proxy ticket
+ proxyTicketResponse = self.client.get(reverse('proxy'), {'targetService': proxyTarget, 'pgt': pgtId}, follow=False)
+ proxyTicketResponseXml = ElementTree.parse(StringIO(proxyTicketResponse.content.decode('utf-8')))
+ self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess", namespaces=NSMAP))
+ self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP))
+ proxyTicket = proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP);
+
+ #Step 3: I have the proxy ticket I can talk to some other backend service as the currently logged in user!
+ proxyValidateResponse = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket.text, 'service': proxyTarget})
+ proxyValidateResponseXml = ElementTree.parse(StringIO(proxyValidateResponse.content.decode('utf-8')))
+
+ auth_success_2 = proxyValidateResponseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
+ user_2 = auth_success.find(CAS + "user", namespaces=NSMAP)
+ proxies_1 = auth_success_2.find(CAS + "proxies")
+ self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket
+
+ self.assertEqual(user.text, user_2.text)
+
+
+ def test_successful_proxy_chaining(self):
+ install_opener(DummyOpener) # Don't really open any URLs
+ proxyTarget_1 = "http://my.sweet.service_1"
+ proxyTarget_2 = "http://my.sweet.service_2"
+
+ response = self._login_user('root', '123')
+ response = self._validate_cas2(response, True, proxyTarget_1 )
+
+ # Test: I'm acting as the service that will call another service
+ # Step 1: Get the proxy granting ticket
+ responseXml = ElementTree.parse(StringIO(response.content.decode('utf-8')))
+ auth_success_1 = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
+ pgt_1 = auth_success_1.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
+ user_1 = auth_success_1.find(CAS + "user", namespaces=NSMAP)
+ self.assertEqual('root', user_1.text)
+ self.assertIsNotNone(pgt_1.text)
+ self.assertTrue(pgt_1.text.startswith('PGTIOU'))
+
+ pgtId_1 = parse_qs(urlparse(DummyOpener.url).query)['pgtId']
+
+ #Step 2: Get the actual proxy ticket
+ proxyTicketResponse_1 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_1, 'pgt': pgtId_1}, follow=False)
+ proxyTicketResponseXml_1 = ElementTree.parse(StringIO(proxyTicketResponse_1.content.decode('utf-8')))
+ self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess", namespaces=NSMAP))
+ self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP))
+ proxyTicket_1 = proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP);
+
+ #Step 3: I'm backend service 1 - I have the proxy ticket - I want to talk to back service 2
+ #
+ proxyValidateResponse_1 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_1.text, 'service': proxyTarget_1, 'pgtUrl': proxyTarget_2})
+ proxyValidateResponseXml_1 = ElementTree.parse(StringIO(proxyValidateResponse_1.content.decode('utf-8')))
+
+ auth_success_2 = proxyValidateResponseXml_1.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
+ user_2 = auth_success_2.find(CAS + "user", namespaces=NSMAP)
+
+ proxies_1 = auth_success_2.find(CAS + "proxies")
+ self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket
+ self.assertIsNotNone(auth_success_2)
+ self.assertEqual('root', user_2.text)
+
+ pgt_2 = auth_success_2.find(CAS + "proxyGrantingTicket", namespaces=NSMAP)
+ user = auth_success_2.find(CAS + "user", namespaces=NSMAP)
+ self.assertEqual('root', user.text)
+ self.assertIsNotNone(pgt_2.text)
+ self.assertTrue(pgt_2.text.startswith('PGTIOU'))
+
+ pgtId_2 = parse_qs(urlparse(DummyOpener.url).query)['pgtId']
+
+ #Step 4: Get the second proxy ticket
+ proxyTicketResponse_2 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_2, 'pgt': pgtId_2})
+ proxyTicketResponseXml_2 = ElementTree.parse(StringIO(proxyTicketResponse_2.content.decode('utf-8')))
+ self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess", namespaces=NSMAP))
+ self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP))
+ proxyTicket_2 = proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)
+
+ proxyValidateResponse_3 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_2.text, 'service': proxyTarget_2, 'pgtUrl': None})
+ proxyValidateResponseXml_3 = ElementTree.parse(StringIO(proxyValidateResponse_3.content.decode('utf-8')))
+
+ auth_success_3 = proxyValidateResponseXml_3.find(CAS + 'authenticationSuccess', namespaces=NSMAP)
+ user_3 = auth_success_3.find(CAS + "user", namespaces=NSMAP)
+
+ proxies_3 = auth_success_3.find(CAS + "proxies")
+ self.assertIsNotNone(proxies_3) # there should be a proxy. I am issued by a Proxy Ticket
+ proxy_3 = proxies_3.find(CAS + "proxy", namespaces=NSMAP)
+ self.assertEqual(proxyTarget_1, proxy_3.text )
+
+ self.assertIsNotNone(auth_success_2)
+ self.assertEqual('root', user_3.text)
+
+
+
+
def test_succeessful_login(self):
response = self._login_user('root', '123')
self._validate_cas1(response, True)
@@ -67,53 +201,76 @@ class ViewsTest(TestCase):
user = User.objects.get(username=self.username)
self.assertEqual(response.content, _cas2_sucess_response(user).content)
+ def test_cas2_validate_twice(self):
+ response = self._login_user('root', '123')
+ response2 = self._validate_cas2(response, True)
+ user = User.objects.get(username=self.username)
+ self.assertEqual(response2.content, _cas2_sucess_response(user).content)
+
+ response2 = self._validate_cas2(response, True)
+ self.assertEqual(response2.content, _cas2_error_response(INVALID_TICKET).content)
+
+ def test_cas2_validate_twice_with_pgt(self):
+ proxyTarget = "http://my.sweet.service_1"
+ response = self._login_user('root', '123')
+ response2 = self._validate_cas2(response, True, proxyTarget)
+ user = User.objects.get(username=self.username)
+ self.assertEqual(response2.content, _cas2_sucess_response(user).content)
+
+ response2 = self._validate_cas2(response, True, proxyTarget)
+ self.assertEqual(response2.content, _cas2_error_response(INVALID_TICKET).content)
+
def test_cas2_custom_attrs(self):
- settings.CAS_CUSTOM_ATTRIBUTES_CALLBACK = cas_mapping
+ cas_collect_custom_attributes.connect(cas_mapping)
response = self._login_user('editor', '123')
+ self.maxDiff=None
response = self._validate_cas2(response, True)
- self.assertEqual(response.content, ''''''
- ''''''
- '''editor'''
- ''''''
- '''Jasig'''
- '''editor'''
- '''True'''
- '''True'''
- '''editor@exapmle.com'''
- ''''''
- ''''''
- '''''')
+ self.assertEqual(response.content.decode('utf-8'),
+ ''''''
+ ''''''
+ '''editor'''
+ ''''''
+ '''Jasig'''
+ '''editor@exapmle.com'''
+ '''editor'''
+ '''True'''
+ '''True'''
+ ''''''
+ ''''''
+ '''''')
self._cas_logout()
response = self._login_user('editor', '123')
settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.ruby_cas'
response = self._validate_cas2(response, True)
- self.assertEqual(response.content, ''''''
- ''''''
- '''editor'''
- '''RubyCAS'''
- '''editor'''
- '''True'''
- '''True'''
- '''editor@exapmle.com'''
- ''''''
- '''''')
+ self.assertEqual(response.content.decode('utf-8'),
+ ''''''
+ ''''''
+ '''editor'''
+ '''RubyCAS'''
+ '''editor@exapmle.com'''
+ '''editor'''
+ '''True'''
+ '''True'''
+ ''''''
+ '''''')
self._cas_logout()
response = self._login_user('editor', '123')
settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.name_value'
response = self._validate_cas2(response, True)
- self.assertEqual(response.content, ''''''
- ''''''
- '''editor'''
- ''''''
- ''''''
- ''''''
- ''''''
- ''''''
- ''''''
- '''''')
+ self.assertEqual(response.content.decode('utf-8'),
+ ''''''
+ ''''''
+ '''editor'''
+ ''''''
+ ''''''
+ ''''''
+ ''''''
+ ''''''
+ ''''''
+ '''''')
def test_cas2_fail_validate(self):
@@ -122,6 +279,23 @@ class ViewsTest(TestCase):
self._validate_cas2(response, False)
+ def test_generate_proxy_granting_ticket(self):
+ install_opener(DummyOpener) # Don't really open any URLs
+ url = 'http://my.call.back/callhere'
+
+ user = User.objects.get(username = 'root')
+ st = ServiceTicket.objects.create(user = user )
+ pgt = generate_proxy_granting_ticket(url, st)
+ self.assertIsNotNone(pgt)
+
+ calledUrl = DummyOpener.url
+ parsedUrl = urlparse(calledUrl)
+ params = parse_qs(parsedUrl.query)
+ self.assertIsNotNone(params['pgtId'])
+ self.assertIsNotNone(params['pgtIou'])
+
+
+
def _fail_login(self, username, password):
response = self._login_user(username, password)
self._validate_cas1(response, False)
@@ -143,7 +317,6 @@ class ViewsTest(TestCase):
return self.client.post(reverse('cas_login'), {
'username': username,
'password': password,
- 'lt': form['lt'].value(),
'service': service
}, follow=False)
@@ -157,35 +330,36 @@ class ViewsTest(TestCase):
response = self.client.get(reverse('cas_validate'), {'ticket': ticket, 'service': self.service}, follow=False)
self.assertEqual(response.status_code, 200)
- self.assertEqual(unicode(response.content), u'yes\n%s\n' % self.username)
+ self.assertEqual(response.content.decode('utf-8'), 'yes\n%s\n' % self.username)
else:
self.assertEqual(response.status_code, 200)
- self.assertEqual(len(response.context['form'].errors), 1)
+ self.assertEqual(len(response.context['errors']), 1)
response = self.client.get(reverse('cas_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False)
self.assertEqual(response.status_code, 200)
- self.assertEqual(response.content, u'no\n\n')
+ self.assertEqual(response.content.decode('utf-8'), 'no\n\n')
- def _validate_cas2(self, response, is_correct=True):
+ def _validate_cas2(self, response, is_correct=True, pgtUrl = None):
if is_correct:
self.assertEqual(response.status_code, 302)
self.assertTrue(response.has_header('location'))
location = urlparse(response['location'])
ticket = location.query.split('=')[1]
-
- response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service}, follow=False)
+ if pgtUrl:
+ response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service, 'pgtUrl': pgtUrl}, follow=False)
+ else:
+ response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service}, follow=False)
self.assertEqual(response.status_code, 200)
else:
self.assertEqual(response.status_code, 200)
- self.assertEqual(len(response.context['form'].errors), 1)
+ self.assertEqual(len(response.context['errors']), 1)
response = self.client.get(reverse('cas_service_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False)
self.assertEqual(response.status_code, 200)
self.assertEqual(response.content, _cas2_error_response(INVALID_TICKET).content)
return response
-
class ModelsTestCase(TestCase):
fixtures = ['cas_users.json', ]
@@ -198,10 +372,10 @@ class ModelsTestCase(TestCase):
self.assertEqual(ticket.get_redirect_url(), '%(service)s?ticket=%(ticket)s' % ticket.__dict__)
-def cas_mapping(user):
+def cas_mapping(sender, user, **kwargs):
return {
- 'is_staff': unicode(user.is_staff),
- 'is_active': unicode(user.is_active),
+ 'is_staff': str(user.is_staff),
+ 'is_active': str(user.is_active),
'email': user.email,
'group': [g.name for g in user.groups.all()]
}