source: main/waeup.sirp/trunk/src/waeup/sirp/applicants/tests/test_authentication.py @ 7240

Last change on this file since 7240 was 7240, checked in by Henrik Bettermann, 13 years ago

Rebuild applicants package (1st part). Applicants now have an applicant_id and a password and can use the regular login page to enter the portal.

Add user_type attribute to SIRPPrincipal objects.

Add some permissions in students package.

Some tests are still missing and will be re-added soon.

  • Property svn:keywords set to Id
File size: 6.7 KB
Line 
1## $Id: test_authentication.py 7240 2011-11-30 23:13:26Z henrik $
2##
3## Copyright (C) 2011 Uli Fouquet & Henrik Bettermann
4## This program is free software; you can redistribute it and/or modify
5## it under the terms of the GNU General Public License as published by
6## the Free Software Foundation; either version 2 of the License, or
7## (at your option) any later version.
8##
9## This program is distributed in the hope that it will be useful,
10## but WITHOUT ANY WARRANTY; without even the implied warranty of
11## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12## GNU General Public License for more details.
13##
14## You should have received a copy of the GNU General Public License
15## along with this program; if not, write to the Free Software
16## Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17##
18import unittest
19from zope.authentication.interfaces import IAuthentication
20from zope.component import provideUtility, queryUtility, getGlobalSiteManager
21from zope.interface.verify import verifyClass, verifyObject
22from zope.password.password import SSHAPasswordManager
23from zope.password.interfaces import IPasswordManager
24from zope.pluggableauth import PluggableAuthentication
25from zope.security.interfaces import Unauthorized
26from zope.securitypolicy.role import Role
27from zope.securitypolicy.interfaces import IRole, Allow
28from waeup.sirp.authentication import get_principal_role_manager
29from waeup.sirp.interfaces import IAuthPluginUtility, IUserAccount
30from waeup.sirp.applicants.authentication import (
31    ApplicantsAuthenticatorSetup, ApplicantAccount)
32from waeup.sirp.applicants.tests.test_browser import ApplicantsFullSetup
33from waeup.sirp.testing import FunctionalLayer
34
35class ApplicantsAuthenticatorSetupTests(unittest.TestCase):
36
37    def test_iface(self):
38        obj = ApplicantsAuthenticatorSetup()
39        verifyClass(IAuthPluginUtility, ApplicantsAuthenticatorSetup)
40        verifyObject(IAuthPluginUtility, obj)
41        return
42
43    def test_register(self):
44        # Make sure registration works.
45        setup = ApplicantsAuthenticatorSetup()
46        pau = PluggableAuthentication()
47        setup.register(pau)
48        self.assertTrue('applicants' in pau.authenticatorPlugins)
49        return
50
51    def test_unregister(self):
52        # Make sure deregistration works.
53        setup = ApplicantsAuthenticatorSetup()
54        pau = PluggableAuthentication()
55        pau.authenticatorPlugins = ('applicants')
56        setup.unregister(pau)
57        self.assertTrue('applicants' not in pau.authenticatorPlugins)
58        return
59
60
61class FakeApplicant(object):
62    applicant_id = 'test_appl'
63    fullname = 'Tilman Gause'
64    password = None
65    email = None
66    phone = None
67
68
69class MinimalPAU(PluggableAuthentication):
70    def getPrincipal(self, id):
71        return 'faked principal'
72
73class ApplicantAccountTests(unittest.TestCase):
74
75    def setUp(self):
76        self.fake_stud = FakeApplicant()
77        self.account = ApplicantAccount(self.fake_stud)
78
79        # We provide a minimal PAU
80        pau = MinimalPAU()
81        provideUtility(pau, IAuthentication)
82
83        # We register a role
84        test_role = Role('waeup.test.Role', 'Testing Role')
85        provideUtility(test_role, IRole, name='waeup.test.Role')
86
87        # We have to setup a password manager utility manually as we
88        # have no functional test. In functional tests this would
89        # happen automatically, but it would take a lot more time to
90        # run the tests.
91        provideUtility(
92            SSHAPasswordManager(), IPasswordManager, 'SSHA')
93        return
94
95    def tearDown(self):
96        self.account.roles = [] # make sure roles are reset
97        gsm = getGlobalSiteManager()
98        to_clean = []
99        # Clear up utilities registered in setUp
100        to_clean.append(
101            (IPasswordManager, queryUtility(
102                    IPasswordManager, name='SSHA', default=None)))
103        to_clean.append(
104            (IAuthentication, queryUtility(IAuthentication, default=None)))
105        to_clean.append(
106            (IRole, queryUtility(IRole, name='test.Role', default=None)))
107        for iface, elem in to_clean:
108            if elem is not None:
109                gsm.unregisterUtility(elem, iface)
110        return
111
112    def test_iface(self):
113        verifyClass(IUserAccount, ApplicantAccount)
114        verifyObject(IUserAccount, self.account)
115        return
116
117    def test_set_password(self):
118        # make sure we can set a password.
119        self.account.setPassword('secret')
120        self.assertTrue(self.fake_stud.password is not None)
121        # we do not store plaintext passwords
122        self.assertTrue(self.fake_stud.password != 'secret')
123        # passwords are stored as unicode
124        self.assertTrue(isinstance(self.fake_stud.password, unicode))
125        return
126
127    def test_check_password(self):
128        # make sure we can check a password.
129        self.account.setPassword('secret')
130        result1 = self.account.checkPassword(None)
131        result2 = self.account.checkPassword('nonsense')
132        result3 = self.account.checkPassword('secret')
133        self.assertEqual(result1, False)
134        self.assertEqual(result2, False)
135        self.assertEqual(result3, True)
136        return
137
138    def test_check_unset_password(self):
139        # empty and unset passwords do not match anything
140        self.fake_stud.password = None
141        result1 = self.account.checkPassword('')
142        self.fake_stud.password = ''
143        result2 = self.account.checkPassword('')
144        self.assertEqual(result1, False)
145        self.assertEqual(result2, False)
146        return
147
148    def test_check_password_no_string(self):
149        # if passed in password is not a string, we gain no access
150        self.fake_stud.password = 'secret'
151        result1 = self.account.checkPassword(None)
152        result2 = self.account.checkPassword(object())
153        self.assertEqual(result1, False)
154        self.assertEqual(result2, False)
155        return
156
157    def test_role_set(self):
158        # make sure we can set roles for principals denoted by account
159        prm = get_principal_role_manager()
160        self.assertEqual(prm.getPrincipalsAndRoles(), [])
161        self.account.roles = ['waeup.test.Role']
162        self.assertEqual(
163            prm.getPrincipalsAndRoles(),
164            [('waeup.test.Role', 'test_appl', Allow)])
165        return
166
167    def test_role_get(self):
168        # make sure we can get roles set for an account
169        self.assertEqual(self.account.roles, [])
170        self.account.roles = ['waeup.test.Role',] # set a role
171        self.assertEqual(self.account.roles, ['waeup.test.Role'])
172        return
173
174class FunctionalApplicantAuthTests(ApplicantsFullSetup):
175
176    layer = FunctionalLayer
177
178    def setUp(self):
179        super(FunctionalApplicantAuthTests, self).setUp()
180        return
181
182    def tearDown(self):
183        super(FunctionalApplicantAuthTests, self).tearDown()
184        return
Note: See TracBrowser for help on using the repository browser.