django-mellon/tests/test_utils.py

236 lines
8.1 KiB
Python

import os
import re
import datetime
import mock
import lasso
import requests.exceptions
from httmock import HTTMock
from mellon.utils import create_server, create_metadata, iso8601_to_datetime, \
flatten_datetime, get_idp
import mellon.utils
from xml_utils import assert_xml_constraints
from utils import error_500, metadata_response, sample_federation_response, \
html_response, dummy_md_response
def test_create_server_connection_error(mocker, rf, private_settings, caplog):
mocker.patch('requests.get',
side_effect=requests.exceptions.ConnectionError('connection error'))
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA_URL': 'http://example.com/metadata',
}
]
request = rf.get('/')
create_server(request)
assert 'connection error' in caplog.text
def test_create_server_internal_server_error(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA_URL': 'http://example.com/metadata',
}
]
request = rf.get('/')
assert not 'failed with error' in caplog.text
with HTTMock(error_500):
create_server(request)
assert 'failed with error' in caplog.text
def test_load_federation_file(mocker, rf, private_settings, caplog, tmpdir):
private_settings.MELLON_FEDERATIONS = [
{'FEDERATION': 'tests/federation-sample.xml'},
]
request = rf.get('/')
assert 'failed with error' not in caplog.text
with HTTMock(html_response):
server = create_server(request)
assert len(server.providers) == 5
def test_load_federation_url(mocker, rf, private_settings, caplog, tmpdir):
private_settings.MELLON_FEDERATIONS = [
{'FEDERATION': 'https://dummy.server/metadata.xml'},
]
request = rf.get('/')
assert 'failed with error' not in caplog.text
with HTTMock(dummy_md_response):
server = create_server(request)
assert len(server.providers) == 3
def test_federation_parameters(mocker, rf, private_settings, caplog, tmpdir):
private_settings.MELLON_FEDERATIONS = [{
'FEDERATION': 'tests/federation-sample.xml',
'VERIFY_SSL_CERTIFICATE': False,
'ERROR_REDIRECT_AFTER_TIMEOUT': 150,
'PROVISION': True
}]
request = rf.get('/')
assert 'failed with error' not in caplog.text
with HTTMock(html_response):
server = create_server(request)
assert len(server.providers) == 5
for entity_id in server.providers.keys():
idp = get_idp(entity_id)
assert idp
assert idp['VERIFY_SSL_CERTIFICATE'] is False
assert idp['ERROR_REDIRECT_AFTER_TIMEOUT'] == 150
assert idp['PROVISION'] is True
def test_create_server_invalid_metadata(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA': 'xxx',
}
]
request = rf.get('/')
assert not 'failed with error' in caplog.text
with HTTMock(error_500):
create_server(request)
assert len(caplog.records) == 5
assert re.search('METADATA.*is invalid|bad metadata in idp', caplog.text)
def test_create_server_invalid_metadata_file(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA': '/xxx',
}
]
request = rf.get('/')
assert not 'failed with error' in caplog.text
with mock.patch('mellon.adapters.file', mock.mock_open(read_data='yyy'), create=True):
with HTTMock(error_500):
server = create_server(request)
assert len(server.providers) == 0
def test_create_server_good_metadata_file(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA': './tests/metadata.xml',
}
]
request = rf.get('/')
with HTTMock(html_response):
server = create_server(request)
assert 'ERROR' not in caplog.text
assert len(server.providers) == 1
def test_create_server_good_metadata(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA': file('tests/metadata.xml').read(),
}
]
request = rf.get('/')
assert not 'failed with error' in caplog.text
server = create_server(request)
assert 'ERROR' not in caplog.text
assert len(server.providers) == 1
def test_create_server_invalid_idp_dict(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
}
]
request = rf.get('/')
assert not 'failed with error' in caplog.text
create_server(request)
assert 'missing METADATA' in caplog.text
def test_create_server_good_metadata_url(mocker, rf, private_settings, caplog):
private_settings.MELLON_IDENTITY_PROVIDERS = [
{
'METADATA_URL': 'http://example.com/metadata',
}
]
request = rf.get('/')
assert not 'failed with error' in caplog.text
with HTTMock(metadata_response):
server = create_server(request)
assert 'ERROR' not in caplog.text
assert len(server.providers) == 1
def test_create_metadata(rf, private_settings, caplog):
ns = {
'sm': 'urn:oasis:names:tc:SAML:2.0:metadata',
'ds': 'http://www.w3.org/2000/09/xmldsig#',
'idpdisc': 'urn:oasis:names:tc:SAML:profiles:SSO:idp-discovery-protocol',
}
private_settings.MELLON_PUBLIC_KEYS = ['xxx', '/yyy']
private_settings.MELLON_NAME_ID_FORMATS = [lasso.SAML2_NAME_IDENTIFIER_FORMAT_UNSPECIFIED]
private_settings.MELLON_DEFAULT_ASSERTION_CONSUMER_BINDING = 'artifact'
request = rf.get('/')
with mock.patch('mellon.utils.file', mock.mock_open(read_data='BEGIN\nyyy\nEND'), create=True):
metadata = create_metadata(request)
assert_xml_constraints(
metadata.encode('utf-8'),
('/sm:EntityDescriptor[@entityID="http://testserver/metadata/"]', 1,
('/*', 1),
('/sm:SPSSODescriptor', 1,
('/*', 7),
('/sm:Extensions', 1,
('/idpdisc:DiscoveryResponse', 1)),
('/sm:NameIDFormat', 1),
('/sm:SingleLogoutService', 1),
('/sm:AssertionConsumerService[@isDefault=\'true\'][@Binding=\'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact\']', 1),
('/sm:AssertionConsumerService[@isDefault=\'true\'][@Binding=\'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\']',
0),
('/sm:AssertionConsumerService[@Binding=\'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\']',
1),
('/sm:KeyDescriptor/ds:KeyInfo/ds:X509Data', 2,
('/ds:X509Certificate', 2),
('/ds:X509Certificate[text()=\'xxx\']', 1),
('/ds:X509Certificate[text()=\'yyy\']', 1)))),
namespaces=ns)
assert metadata is create_metadata(request)
def test_iso8601_to_datetime(private_settings):
import django.utils.timezone
import pytz
private_settings.TIME_ZONE = 'UTC'
if hasattr(django.utils.timezone.get_default_timezone, 'cache_clear'):
django.utils.timezone.get_default_timezone.cache_clear()
django.utils.timezone._localtime = None
private_settings.USE_TZ = False
# UTC ISO8601 -> naive datetime UTC
assert iso8601_to_datetime('2010-10-01T10:10:34Z') == datetime.datetime(
2010, 10, 01, 10, 10, 34)
# NAIVE ISO8601 -> naive datetime UTC
assert iso8601_to_datetime('2010-10-01T10:10:34') == datetime.datetime(
2010, 10, 01, 10, 10, 34)
private_settings.USE_TZ = True
# UTC+1h ISO8601 -> Aware datetime UTC
assert iso8601_to_datetime('2010-10-01T10:10:34+01:00') == datetime.datetime(
2010, 10, 01, 9, 10, 34, tzinfo=pytz.utc)
# Naive ISO8601 -> Aware datetime UTC
assert iso8601_to_datetime('2010-10-01T10:10:34') == datetime.datetime(
2010, 10, 01, 10, 10, 34, tzinfo=pytz.utc)
def test_flatten_datetime():
d = {
'x': datetime.datetime(2010, 10, 10, 10, 10, 34),
'y': 1,
'z': 'uu',
}
assert set(flatten_datetime(d).keys()) == set(['x', 'y', 'z'])
assert flatten_datetime(d)['x'] == '2010-10-10T10:10:34'
assert flatten_datetime(d)['y'] == 1
assert flatten_datetime(d)['z'] == 'uu'