From: Radek Czajka Date: Sun, 21 Sep 2014 11:39:48 +0000 (+0200) Subject: Move unit tests out of the app. X-Git-Tag: 22.4~10^2~2 X-Git-Url: https://git.mdrn.pl/django-cas-provider.git/commitdiff_plain/d53d0a307c10efb05ce0de82ab690c94c5deb5a4?ds=sidebyside;hp=-c Move unit tests out of the app. Add tox configuration (tox 1.8 needed), fix requirements and package discovery in setup.py. --- d53d0a307c10efb05ce0de82ab690c94c5deb5a4 diff --git a/.gitignore b/.gitignore index 2bed7fd..e95e92d 100644 --- a/.gitignore +++ b/.gitignore @@ -3,6 +3,9 @@ *.egg-info /build /dist +.tox +.coverage +htmlcov # Mac OS X garbage .DS_Store diff --git a/cas_provider/tests.py b/cas_provider/tests.py deleted file mode 100644 index 2f87330..0000000 --- a/cas_provider/tests.py +++ /dev/null @@ -1,381 +0,0 @@ -from __future__ import unicode_literals -from io import StringIO -from xml import etree -from xml.etree import ElementTree -import cas_provider -from cas_provider.attribute_formatters import CAS, NSMAP -from cas_provider.models import ServiceTicket -from cas_provider.signals import cas_collect_custom_attributes -from cas_provider.views import _cas2_sucess_response, INVALID_TICKET, _cas2_error_response, generate_proxy_granting_ticket -from django.contrib.auth.models import User, UserManager -from django.core.urlresolvers import reverse -from django.test import TestCase -from django.conf import settings - -try: - from urllib.parse import urlparse, parse_qsl, parse_qs - from urllib.request import install_opener -except: - from urlparse import urlparse, parse_qsl, parse_qs - from urllib2 import install_opener - - - - -class DummyOpener(object): - url = None - - @staticmethod - def open(url, *args, **kwargs): - DummyOpener.url = url - - -class ViewsTest(TestCase): - - fixtures = ['cas_users', ] - - - - def setUp(self): - self.service = 'http://example.com/' - - - def test_successful_login_with_proxy(self): - install_opener(DummyOpener) # Don't really open any URLs - proxyTarget = "http://my.sweet.service" - - response = self._login_user('root', '123') - response = self._validate_cas2(response, True, proxyTarget ) - - # Test: I'm acting as the service that will call another service - # Step 1: Get the proxy granting ticket - responseXml = ElementTree.parse(StringIO(response.content.decode('utf-8'))) - auth_success = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP) - pgt = auth_success.find(CAS + "proxyGrantingTicket", namespaces=NSMAP) - user = auth_success.find(CAS + "user", namespaces=NSMAP) - self.assertEqual('root', user.text) - self.assertIsNotNone(pgt.text) - self.assertTrue(pgt.text.startswith('PGTIOU')) - - pgtId = parse_qs(urlparse(DummyOpener.url).query)['pgtId'] - - #Step 2: Get the actual proxy ticket - proxyTicketResponse = self.client.get(reverse('proxy'), {'targetService': proxyTarget, 'pgt': pgtId}, follow=False) - proxyTicketResponseXml = ElementTree.parse(StringIO(proxyTicketResponse.content.decode('utf-8'))) - self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess", namespaces=NSMAP)) - self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)) - proxyTicket = proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP); - - #Step 3: I have the proxy ticket I can talk to some other backend service as the currently logged in user! - proxyValidateResponse = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket.text, 'service': proxyTarget}) - proxyValidateResponseXml = ElementTree.parse(StringIO(proxyValidateResponse.content.decode('utf-8'))) - - auth_success_2 = proxyValidateResponseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP) - user_2 = auth_success.find(CAS + "user", namespaces=NSMAP) - proxies_1 = auth_success_2.find(CAS + "proxies") - self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket - - self.assertEqual(user.text, user_2.text) - - - def test_successful_proxy_chaining(self): - install_opener(DummyOpener) # Don't really open any URLs - proxyTarget_1 = "http://my.sweet.service_1" - proxyTarget_2 = "http://my.sweet.service_2" - - response = self._login_user('root', '123') - response = self._validate_cas2(response, True, proxyTarget_1 ) - - # Test: I'm acting as the service that will call another service - # Step 1: Get the proxy granting ticket - responseXml = ElementTree.parse(StringIO(response.content.decode('utf-8'))) - auth_success_1 = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP) - pgt_1 = auth_success_1.find(CAS + "proxyGrantingTicket", namespaces=NSMAP) - user_1 = auth_success_1.find(CAS + "user", namespaces=NSMAP) - self.assertEqual('root', user_1.text) - self.assertIsNotNone(pgt_1.text) - self.assertTrue(pgt_1.text.startswith('PGTIOU')) - - pgtId_1 = parse_qs(urlparse(DummyOpener.url).query)['pgtId'] - - #Step 2: Get the actual proxy ticket - proxyTicketResponse_1 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_1, 'pgt': pgtId_1}, follow=False) - proxyTicketResponseXml_1 = ElementTree.parse(StringIO(proxyTicketResponse_1.content.decode('utf-8'))) - self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess", namespaces=NSMAP)) - self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)) - proxyTicket_1 = proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP); - - #Step 3: I'm backend service 1 - I have the proxy ticket - I want to talk to back service 2 - # - proxyValidateResponse_1 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_1.text, 'service': proxyTarget_1, 'pgtUrl': proxyTarget_2}) - proxyValidateResponseXml_1 = ElementTree.parse(StringIO(proxyValidateResponse_1.content.decode('utf-8'))) - - auth_success_2 = proxyValidateResponseXml_1.find(CAS + 'authenticationSuccess', namespaces=NSMAP) - user_2 = auth_success_2.find(CAS + "user", namespaces=NSMAP) - - proxies_1 = auth_success_2.find(CAS + "proxies") - self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket - self.assertIsNotNone(auth_success_2) - self.assertEqual('root', user_2.text) - - pgt_2 = auth_success_2.find(CAS + "proxyGrantingTicket", namespaces=NSMAP) - user = auth_success_2.find(CAS + "user", namespaces=NSMAP) - self.assertEqual('root', user.text) - self.assertIsNotNone(pgt_2.text) - self.assertTrue(pgt_2.text.startswith('PGTIOU')) - - pgtId_2 = parse_qs(urlparse(DummyOpener.url).query)['pgtId'] - - #Step 4: Get the second proxy ticket - proxyTicketResponse_2 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_2, 'pgt': pgtId_2}) - proxyTicketResponseXml_2 = ElementTree.parse(StringIO(proxyTicketResponse_2.content.decode('utf-8'))) - self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess", namespaces=NSMAP)) - self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)) - proxyTicket_2 = proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP) - - proxyValidateResponse_3 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_2.text, 'service': proxyTarget_2, 'pgtUrl': None}) - proxyValidateResponseXml_3 = ElementTree.parse(StringIO(proxyValidateResponse_3.content.decode('utf-8'))) - - auth_success_3 = proxyValidateResponseXml_3.find(CAS + 'authenticationSuccess', namespaces=NSMAP) - user_3 = auth_success_3.find(CAS + "user", namespaces=NSMAP) - - proxies_3 = auth_success_3.find(CAS + "proxies") - self.assertIsNotNone(proxies_3) # there should be a proxy. I am issued by a Proxy Ticket - proxy_3 = proxies_3.find(CAS + "proxy", namespaces=NSMAP) - self.assertEqual(proxyTarget_1, proxy_3.text ) - - self.assertIsNotNone(auth_success_2) - self.assertEqual('root', user_3.text) - - - - - def test_succeessful_login(self): - response = self._login_user('root', '123') - self._validate_cas1(response, True) - - response = self.client.get(reverse('cas_login'), {'service': self.service}, follow=False) - self.assertEqual(response.status_code, 302) - self.assertTrue(response['location'].startswith('%s?ticket=' % self.service)) - - response = self.client.get(reverse('cas_login'), follow=False) - self.assertEqual(response.status_code, 302) - self.assertTrue(response['location'].startswith('http://testserver/')) - - response = self.client.get(response['location'], follow=False) - self.assertIn(response.status_code, [302, 200]) - - response = self.client.get(reverse('cas_login'), {'service': self.service, 'warn': True}, follow=False) - self.assertEqual(response.status_code, 200) - self.assertTemplateUsed(response, 'cas/warn.html') - - - def _cas_logout(self): - response = self.client.get(reverse('cas_logout'), follow=False) - self.assertEqual(response.status_code, 200) - - - def test_logout(self): - response = self._login_user('root', '123') - self._validate_cas1(response, True) - - self._cas_logout() - - response = self.client.get(reverse('cas_login'), follow=False) - self.assertEqual(response.status_code, 200) - self.assertEqual(response.context['user'].is_anonymous(), True) - - - def test_broken_pwd(self): - self._fail_login('root', '321') - - def test_broken_username(self): - self._fail_login('notroot', '123') - - def test_nonactive_user_login(self): - self._fail_login('nonactive', '123') - - def test_cas2_success_validate(self): - response = self._login_user('root', '123') - response = self._validate_cas2(response, True) - user = User.objects.get(username=self.username) - self.assertEqual(response.content, _cas2_sucess_response(user).content) - - def test_cas2_validate_twice(self): - response = self._login_user('root', '123') - response2 = self._validate_cas2(response, True) - user = User.objects.get(username=self.username) - self.assertEqual(response2.content, _cas2_sucess_response(user).content) - - response2 = self._validate_cas2(response, True) - self.assertEqual(response2.content, _cas2_error_response(INVALID_TICKET).content) - - def test_cas2_validate_twice_with_pgt(self): - proxyTarget = "http://my.sweet.service_1" - response = self._login_user('root', '123') - response2 = self._validate_cas2(response, True, proxyTarget) - user = User.objects.get(username=self.username) - self.assertEqual(response2.content, _cas2_sucess_response(user).content) - - response2 = self._validate_cas2(response, True, proxyTarget) - self.assertEqual(response2.content, _cas2_error_response(INVALID_TICKET).content) - - def test_cas2_custom_attrs(self): - cas_collect_custom_attributes.connect(cas_mapping) - response = self._login_user('editor', '123') - self.maxDiff=None - - response = self._validate_cas2(response, True) - self.assertEqual(response.content.decode('utf-8'), - '''''' - '''''' - '''editor''' - '''''' - '''Jasig''' - '''editor@exapmle.com''' - '''editor''' - '''True''' - '''True''' - '''''' - '''''' - '''''') - - self._cas_logout() - response = self._login_user('editor', '123') - settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.ruby_cas' - response = self._validate_cas2(response, True) - self.assertEqual(response.content.decode('utf-8'), - '''''' - '''''' - '''editor''' - '''RubyCAS''' - '''editor@exapmle.com''' - '''editor''' - '''True''' - '''True''' - '''''' - '''''') - - self._cas_logout() - response = self._login_user('editor', '123') - settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.name_value' - response = self._validate_cas2(response, True) - self.assertEqual(response.content.decode('utf-8'), - '''''' - '''''' - '''editor''' - '''''' - '''''' - '''''' - '''''' - '''''' - '''''' - '''''') - - - def test_cas2_fail_validate(self): - for user, pwd in (('root', '321'), ('notroot', '123'), ('nonactive', '123')): - response = self._login_user(user, pwd) - self._validate_cas2(response, False) - - - def test_generate_proxy_granting_ticket(self): - install_opener(DummyOpener) # Don't really open any URLs - url = 'http://my.call.back/callhere' - - user = User.objects.get(username = 'root') - st = ServiceTicket.objects.create(user = user ) - pgt = generate_proxy_granting_ticket(url, st) - self.assertIsNotNone(pgt) - - calledUrl = DummyOpener.url - parsedUrl = urlparse(calledUrl) - params = parse_qs(parsedUrl.query) - self.assertIsNotNone(params['pgtId']) - self.assertIsNotNone(params['pgtIou']) - - - - def _fail_login(self, username, password): - response = self._login_user(username, password) - self._validate_cas1(response, False) - - response = self.client.get(reverse('cas_login'), {'service': self.service}, follow=False) - self.assertEqual(response.status_code, 200) - response = self.client.get(reverse('cas_login'), follow=False) - self.assertEqual(response.status_code, 200) - - - - def _login_user(self, username, password): - self.username = username - response = self.client.get(reverse('cas_login'), {'service': self.service}) - self.assertEqual(response.status_code, 200) - self.assertTemplateUsed(response, 'cas/login.html') - form = response.context['form'] - service = form['service'].value() - return self.client.post(reverse('cas_login'), { - 'username': username, - 'password': password, - 'service': service - }, follow=False) - - - def _validate_cas1(self, response, is_correct=True): - if is_correct: - self.assertEqual(response.status_code, 302) - self.assertTrue(response.has_header('location')) - location = urlparse(response['location']) - ticket = location.query.split('=')[1] - - response = self.client.get(reverse('cas_validate'), {'ticket': ticket, 'service': self.service}, follow=False) - self.assertEqual(response.status_code, 200) - self.assertEqual(response.content.decode('utf-8'), 'yes\n%s\n' % self.username) - else: - self.assertEqual(response.status_code, 200) - self.assertEqual(len(response.context['errors']), 1) - - response = self.client.get(reverse('cas_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False) - self.assertEqual(response.status_code, 200) - self.assertEqual(response.content.decode('utf-8'), 'no\n\n') - - - def _validate_cas2(self, response, is_correct=True, pgtUrl = None): - if is_correct: - self.assertEqual(response.status_code, 302) - self.assertTrue(response.has_header('location')) - location = urlparse(response['location']) - ticket = location.query.split('=')[1] - if pgtUrl: - response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service, 'pgtUrl': pgtUrl}, follow=False) - else: - response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service}, follow=False) - self.assertEqual(response.status_code, 200) - else: - self.assertEqual(response.status_code, 200) - self.assertEqual(len(response.context['errors']), 1) - - response = self.client.get(reverse('cas_service_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False) - self.assertEqual(response.status_code, 200) - self.assertEqual(response.content, _cas2_error_response(INVALID_TICKET).content) - return response - -class ModelsTestCase(TestCase): - - fixtures = ['cas_users.json', ] - - def setUp(self): - self.user = User.objects.get(username='root') - - def test_redirects(self): - ticket = ServiceTicket.objects.create(service='http://example.com', user=self.user) - self.assertEqual(ticket.get_redirect_url(), '%(service)s?ticket=%(ticket)s' % ticket.__dict__) - - -def cas_mapping(sender, user, **kwargs): - return { - 'is_staff': str(user.is_staff), - 'is_active': str(user.is_active), - 'email': user.email, - 'group': [g.name for g in user.groups.all()] - } diff --git a/cas_provider_examples/manage.py b/cas_provider_examples/manage.py old mode 100644 new mode 100755 diff --git a/cas_provider_examples/simple/models.py b/cas_provider_examples/simple/models.py new file mode 100644 index 0000000..e69de29 diff --git a/cas_provider_examples/simple/settings.py b/cas_provider_examples/simple/settings.py index 1896e81..679863a 100644 --- a/cas_provider_examples/simple/settings.py +++ b/cas_provider_examples/simple/settings.py @@ -116,6 +116,7 @@ INSTALLED_APPS = ( 'django.contrib.messages', 'django.contrib.staticfiles', 'cas_provider', + 'simple', ) # A sample logging configuration. The only tangible logging diff --git a/cas_provider_examples/simple/tests.py b/cas_provider_examples/simple/tests.py new file mode 100644 index 0000000..2f87330 --- /dev/null +++ b/cas_provider_examples/simple/tests.py @@ -0,0 +1,381 @@ +from __future__ import unicode_literals +from io import StringIO +from xml import etree +from xml.etree import ElementTree +import cas_provider +from cas_provider.attribute_formatters import CAS, NSMAP +from cas_provider.models import ServiceTicket +from cas_provider.signals import cas_collect_custom_attributes +from cas_provider.views import _cas2_sucess_response, INVALID_TICKET, _cas2_error_response, generate_proxy_granting_ticket +from django.contrib.auth.models import User, UserManager +from django.core.urlresolvers import reverse +from django.test import TestCase +from django.conf import settings + +try: + from urllib.parse import urlparse, parse_qsl, parse_qs + from urllib.request import install_opener +except: + from urlparse import urlparse, parse_qsl, parse_qs + from urllib2 import install_opener + + + + +class DummyOpener(object): + url = None + + @staticmethod + def open(url, *args, **kwargs): + DummyOpener.url = url + + +class ViewsTest(TestCase): + + fixtures = ['cas_users', ] + + + + def setUp(self): + self.service = 'http://example.com/' + + + def test_successful_login_with_proxy(self): + install_opener(DummyOpener) # Don't really open any URLs + proxyTarget = "http://my.sweet.service" + + response = self._login_user('root', '123') + response = self._validate_cas2(response, True, proxyTarget ) + + # Test: I'm acting as the service that will call another service + # Step 1: Get the proxy granting ticket + responseXml = ElementTree.parse(StringIO(response.content.decode('utf-8'))) + auth_success = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP) + pgt = auth_success.find(CAS + "proxyGrantingTicket", namespaces=NSMAP) + user = auth_success.find(CAS + "user", namespaces=NSMAP) + self.assertEqual('root', user.text) + self.assertIsNotNone(pgt.text) + self.assertTrue(pgt.text.startswith('PGTIOU')) + + pgtId = parse_qs(urlparse(DummyOpener.url).query)['pgtId'] + + #Step 2: Get the actual proxy ticket + proxyTicketResponse = self.client.get(reverse('proxy'), {'targetService': proxyTarget, 'pgt': pgtId}, follow=False) + proxyTicketResponseXml = ElementTree.parse(StringIO(proxyTicketResponse.content.decode('utf-8'))) + self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess", namespaces=NSMAP)) + self.assertIsNotNone(proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)) + proxyTicket = proxyTicketResponseXml.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP); + + #Step 3: I have the proxy ticket I can talk to some other backend service as the currently logged in user! + proxyValidateResponse = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket.text, 'service': proxyTarget}) + proxyValidateResponseXml = ElementTree.parse(StringIO(proxyValidateResponse.content.decode('utf-8'))) + + auth_success_2 = proxyValidateResponseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP) + user_2 = auth_success.find(CAS + "user", namespaces=NSMAP) + proxies_1 = auth_success_2.find(CAS + "proxies") + self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket + + self.assertEqual(user.text, user_2.text) + + + def test_successful_proxy_chaining(self): + install_opener(DummyOpener) # Don't really open any URLs + proxyTarget_1 = "http://my.sweet.service_1" + proxyTarget_2 = "http://my.sweet.service_2" + + response = self._login_user('root', '123') + response = self._validate_cas2(response, True, proxyTarget_1 ) + + # Test: I'm acting as the service that will call another service + # Step 1: Get the proxy granting ticket + responseXml = ElementTree.parse(StringIO(response.content.decode('utf-8'))) + auth_success_1 = responseXml.find(CAS + 'authenticationSuccess', namespaces=NSMAP) + pgt_1 = auth_success_1.find(CAS + "proxyGrantingTicket", namespaces=NSMAP) + user_1 = auth_success_1.find(CAS + "user", namespaces=NSMAP) + self.assertEqual('root', user_1.text) + self.assertIsNotNone(pgt_1.text) + self.assertTrue(pgt_1.text.startswith('PGTIOU')) + + pgtId_1 = parse_qs(urlparse(DummyOpener.url).query)['pgtId'] + + #Step 2: Get the actual proxy ticket + proxyTicketResponse_1 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_1, 'pgt': pgtId_1}, follow=False) + proxyTicketResponseXml_1 = ElementTree.parse(StringIO(proxyTicketResponse_1.content.decode('utf-8'))) + self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess", namespaces=NSMAP)) + self.assertIsNotNone(proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)) + proxyTicket_1 = proxyTicketResponseXml_1.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP); + + #Step 3: I'm backend service 1 - I have the proxy ticket - I want to talk to back service 2 + # + proxyValidateResponse_1 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_1.text, 'service': proxyTarget_1, 'pgtUrl': proxyTarget_2}) + proxyValidateResponseXml_1 = ElementTree.parse(StringIO(proxyValidateResponse_1.content.decode('utf-8'))) + + auth_success_2 = proxyValidateResponseXml_1.find(CAS + 'authenticationSuccess', namespaces=NSMAP) + user_2 = auth_success_2.find(CAS + "user", namespaces=NSMAP) + + proxies_1 = auth_success_2.find(CAS + "proxies") + self.assertIsNone(proxies_1) # there are no proxies. I am issued by a Service Ticket + self.assertIsNotNone(auth_success_2) + self.assertEqual('root', user_2.text) + + pgt_2 = auth_success_2.find(CAS + "proxyGrantingTicket", namespaces=NSMAP) + user = auth_success_2.find(CAS + "user", namespaces=NSMAP) + self.assertEqual('root', user.text) + self.assertIsNotNone(pgt_2.text) + self.assertTrue(pgt_2.text.startswith('PGTIOU')) + + pgtId_2 = parse_qs(urlparse(DummyOpener.url).query)['pgtId'] + + #Step 4: Get the second proxy ticket + proxyTicketResponse_2 = self.client.get(reverse('proxy'), {'targetService': proxyTarget_2, 'pgt': pgtId_2}) + proxyTicketResponseXml_2 = ElementTree.parse(StringIO(proxyTicketResponse_2.content.decode('utf-8'))) + self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess", namespaces=NSMAP)) + self.assertIsNotNone(proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP)) + proxyTicket_2 = proxyTicketResponseXml_2.find(CAS + "proxySuccess/cas:proxyTicket", namespaces=NSMAP) + + proxyValidateResponse_3 = self.client.get(reverse('cas_proxy_validate'), {'ticket': proxyTicket_2.text, 'service': proxyTarget_2, 'pgtUrl': None}) + proxyValidateResponseXml_3 = ElementTree.parse(StringIO(proxyValidateResponse_3.content.decode('utf-8'))) + + auth_success_3 = proxyValidateResponseXml_3.find(CAS + 'authenticationSuccess', namespaces=NSMAP) + user_3 = auth_success_3.find(CAS + "user", namespaces=NSMAP) + + proxies_3 = auth_success_3.find(CAS + "proxies") + self.assertIsNotNone(proxies_3) # there should be a proxy. I am issued by a Proxy Ticket + proxy_3 = proxies_3.find(CAS + "proxy", namespaces=NSMAP) + self.assertEqual(proxyTarget_1, proxy_3.text ) + + self.assertIsNotNone(auth_success_2) + self.assertEqual('root', user_3.text) + + + + + def test_succeessful_login(self): + response = self._login_user('root', '123') + self._validate_cas1(response, True) + + response = self.client.get(reverse('cas_login'), {'service': self.service}, follow=False) + self.assertEqual(response.status_code, 302) + self.assertTrue(response['location'].startswith('%s?ticket=' % self.service)) + + response = self.client.get(reverse('cas_login'), follow=False) + self.assertEqual(response.status_code, 302) + self.assertTrue(response['location'].startswith('http://testserver/')) + + response = self.client.get(response['location'], follow=False) + self.assertIn(response.status_code, [302, 200]) + + response = self.client.get(reverse('cas_login'), {'service': self.service, 'warn': True}, follow=False) + self.assertEqual(response.status_code, 200) + self.assertTemplateUsed(response, 'cas/warn.html') + + + def _cas_logout(self): + response = self.client.get(reverse('cas_logout'), follow=False) + self.assertEqual(response.status_code, 200) + + + def test_logout(self): + response = self._login_user('root', '123') + self._validate_cas1(response, True) + + self._cas_logout() + + response = self.client.get(reverse('cas_login'), follow=False) + self.assertEqual(response.status_code, 200) + self.assertEqual(response.context['user'].is_anonymous(), True) + + + def test_broken_pwd(self): + self._fail_login('root', '321') + + def test_broken_username(self): + self._fail_login('notroot', '123') + + def test_nonactive_user_login(self): + self._fail_login('nonactive', '123') + + def test_cas2_success_validate(self): + response = self._login_user('root', '123') + response = self._validate_cas2(response, True) + user = User.objects.get(username=self.username) + self.assertEqual(response.content, _cas2_sucess_response(user).content) + + def test_cas2_validate_twice(self): + response = self._login_user('root', '123') + response2 = self._validate_cas2(response, True) + user = User.objects.get(username=self.username) + self.assertEqual(response2.content, _cas2_sucess_response(user).content) + + response2 = self._validate_cas2(response, True) + self.assertEqual(response2.content, _cas2_error_response(INVALID_TICKET).content) + + def test_cas2_validate_twice_with_pgt(self): + proxyTarget = "http://my.sweet.service_1" + response = self._login_user('root', '123') + response2 = self._validate_cas2(response, True, proxyTarget) + user = User.objects.get(username=self.username) + self.assertEqual(response2.content, _cas2_sucess_response(user).content) + + response2 = self._validate_cas2(response, True, proxyTarget) + self.assertEqual(response2.content, _cas2_error_response(INVALID_TICKET).content) + + def test_cas2_custom_attrs(self): + cas_collect_custom_attributes.connect(cas_mapping) + response = self._login_user('editor', '123') + self.maxDiff=None + + response = self._validate_cas2(response, True) + self.assertEqual(response.content.decode('utf-8'), + '''''' + '''''' + '''editor''' + '''''' + '''Jasig''' + '''editor@exapmle.com''' + '''editor''' + '''True''' + '''True''' + '''''' + '''''' + '''''') + + self._cas_logout() + response = self._login_user('editor', '123') + settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.ruby_cas' + response = self._validate_cas2(response, True) + self.assertEqual(response.content.decode('utf-8'), + '''''' + '''''' + '''editor''' + '''RubyCAS''' + '''editor@exapmle.com''' + '''editor''' + '''True''' + '''True''' + '''''' + '''''') + + self._cas_logout() + response = self._login_user('editor', '123') + settings.CAS_CUSTOM_ATTRIBUTES_FORMATER = 'cas_provider.attribute_formatters.name_value' + response = self._validate_cas2(response, True) + self.assertEqual(response.content.decode('utf-8'), + '''''' + '''''' + '''editor''' + '''''' + '''''' + '''''' + '''''' + '''''' + '''''' + '''''') + + + def test_cas2_fail_validate(self): + for user, pwd in (('root', '321'), ('notroot', '123'), ('nonactive', '123')): + response = self._login_user(user, pwd) + self._validate_cas2(response, False) + + + def test_generate_proxy_granting_ticket(self): + install_opener(DummyOpener) # Don't really open any URLs + url = 'http://my.call.back/callhere' + + user = User.objects.get(username = 'root') + st = ServiceTicket.objects.create(user = user ) + pgt = generate_proxy_granting_ticket(url, st) + self.assertIsNotNone(pgt) + + calledUrl = DummyOpener.url + parsedUrl = urlparse(calledUrl) + params = parse_qs(parsedUrl.query) + self.assertIsNotNone(params['pgtId']) + self.assertIsNotNone(params['pgtIou']) + + + + def _fail_login(self, username, password): + response = self._login_user(username, password) + self._validate_cas1(response, False) + + response = self.client.get(reverse('cas_login'), {'service': self.service}, follow=False) + self.assertEqual(response.status_code, 200) + response = self.client.get(reverse('cas_login'), follow=False) + self.assertEqual(response.status_code, 200) + + + + def _login_user(self, username, password): + self.username = username + response = self.client.get(reverse('cas_login'), {'service': self.service}) + self.assertEqual(response.status_code, 200) + self.assertTemplateUsed(response, 'cas/login.html') + form = response.context['form'] + service = form['service'].value() + return self.client.post(reverse('cas_login'), { + 'username': username, + 'password': password, + 'service': service + }, follow=False) + + + def _validate_cas1(self, response, is_correct=True): + if is_correct: + self.assertEqual(response.status_code, 302) + self.assertTrue(response.has_header('location')) + location = urlparse(response['location']) + ticket = location.query.split('=')[1] + + response = self.client.get(reverse('cas_validate'), {'ticket': ticket, 'service': self.service}, follow=False) + self.assertEqual(response.status_code, 200) + self.assertEqual(response.content.decode('utf-8'), 'yes\n%s\n' % self.username) + else: + self.assertEqual(response.status_code, 200) + self.assertEqual(len(response.context['errors']), 1) + + response = self.client.get(reverse('cas_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False) + self.assertEqual(response.status_code, 200) + self.assertEqual(response.content.decode('utf-8'), 'no\n\n') + + + def _validate_cas2(self, response, is_correct=True, pgtUrl = None): + if is_correct: + self.assertEqual(response.status_code, 302) + self.assertTrue(response.has_header('location')) + location = urlparse(response['location']) + ticket = location.query.split('=')[1] + if pgtUrl: + response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service, 'pgtUrl': pgtUrl}, follow=False) + else: + response = self.client.get(reverse('cas_service_validate'), {'ticket': ticket, 'service': self.service}, follow=False) + self.assertEqual(response.status_code, 200) + else: + self.assertEqual(response.status_code, 200) + self.assertEqual(len(response.context['errors']), 1) + + response = self.client.get(reverse('cas_service_validate'), {'ticket': 'ST-12312312312312312312312', 'service': self.service}, follow=False) + self.assertEqual(response.status_code, 200) + self.assertEqual(response.content, _cas2_error_response(INVALID_TICKET).content) + return response + +class ModelsTestCase(TestCase): + + fixtures = ['cas_users.json', ] + + def setUp(self): + self.user = User.objects.get(username='root') + + def test_redirects(self): + ticket = ServiceTicket.objects.create(service='http://example.com', user=self.user) + self.assertEqual(ticket.get_redirect_url(), '%(service)s?ticket=%(ticket)s' % ticket.__dict__) + + +def cas_mapping(sender, user, **kwargs): + return { + 'is_staff': str(user.is_staff), + 'is_active': str(user.is_active), + 'email': user.email, + 'group': [g.name for g in user.groups.all()] + } diff --git a/setup.py b/setup.py index fe96615..40effde 100644 --- a/setup.py +++ b/setup.py @@ -11,13 +11,15 @@ setup( author='(Chris Williams), Sebastian Annies', author_email='(chris@nitron.org), sebastian.annies@googlemail.com', url='https://github.com/castlabs/django-cas-provider', - packages=find_packages(), + packages=find_packages(exclude=['cas_provider_examples']), include_package_data=True, license='MIT', long_description=read('README.rst'), zip_safe=False, - install_requires=['setuptools', - 'south>=0.7.2',], + install_requires=[ + 'Django>=1.5,<1.8', + 'lxml', + ], classifiers = [ "Development Status :: 3 - Alpha", "Framework :: Django", diff --git a/tox.ini b/tox.ini new file mode 100644 index 0000000..c11d95d --- /dev/null +++ b/tox.ini @@ -0,0 +1,30 @@ +[tox] +envlist=clear, + d1{5,6}-py{26,27,32,33}, + d{17,d}-py{27,32,33,34}, + stats + +[testenv] +indexserver=https://py.mdrn.pl:8443 +commands=coverage run --source=cas_provider --append --branch cas_provider_examples/manage.py test simple +deps= + d15: Django>=1.5,<1.6 + d16: Django>=1.6,<1.7 + d17: Django>=1.7,<1.8 + dd: https://github.com/django/django/zipball/master + coverage +basepython= + py26: python2.6 + py27: python2.7 + py32: python3.2 + py33: python3.3 + py34: python3.4 + +[testenv:clear] +basepython=python3.4 +commands=coverage erase + +[testenv:stats] +basepython=python3.4 +commands=coverage html +