def test_login_authenticate_do_not_create_user(monkeypatch, django_user_model, settings): """ Test the case where the login view authenticates a user, but does not create a user based on the CAS_CREATE_USER setting. """ # No need to test the message framework settings.CAS_CREATE_USER = False # No need to test the message framework settings.CAS_LOGIN_MSG = None # Make sure we use our backend settings.AUTHENTICATION_BACKENDS = ['django_cas_ng.backends.CASBackend'] # Json serializer was havinga hard time settings.SESSION_SERIALIZER = 'django.contrib.sessions.serializers.PickleSerializer' def mock_verify(ticket, service): return '*****@*****.**', {'ticket': ticket, 'service': service}, None monkeypatch.setattr('cas.CASClientV2.verify_ticket', mock_verify) factory = RequestFactory() request = factory.get('/login/', {'ticket': 'fake-ticket', 'service': 'fake-service'}) # Create a session object from the middleware process_request_for_middleware(request, SessionMiddleware) # Create a user object from middleware process_request_for_middleware(request, AuthenticationMiddleware) with pytest.raises(PermissionDenied): LoginView().get(request) assert django_user_model.objects.filter(username='******').exists() is False
def test_login_authenticate_and_create_user(monkeypatch, django_user_model, settings): """ Test the case where the login view authenticates a new user. """ # No need to test the message framework settings.CAS_LOGIN_MSG = None # Make sure we use our backend settings.AUTHENTICATION_BACKENDS = ['django_cas_ng.backends.CASBackend'] # Json serializer was havinga hard time settings.SESSION_SERIALIZER = 'django.contrib.sessions.serializers.PickleSerializer' def mock_verify(ticket, service): return '*****@*****.**', {'ticket': ticket, 'service': service}, None monkeypatch.setattr('cas.CASClientV2.verify_ticket', mock_verify) factory = RequestFactory() request = factory.get('/login/', {'ticket': 'fake-ticket', 'service': 'fake-service'}) # Create a session object from the middleware process_request_for_middleware(request, SessionMiddleware) # Create a user object from middleware process_request_for_middleware(request, AuthenticationMiddleware) response = LoginView().get(request) assert response.status_code == 302 assert response['Location'] == '/' assert django_user_model.objects.get(username='******').is_authenticated is True
def test_login_post_logout(django_user_model, settings): """ Test that when CAS authentication creates a user, the signal is called with `created = True` """ settings.CAS_VERSION = 'CAS_2_SAML_1_0' data = { 'logoutRequest': '<samlp:LogoutRequest ' 'xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">' '<samlp:SessionIndex>fake-ticket' '</samlp:SessionIndex></samlp:LogoutRequest>' } session = SessionStore() session['fake_session'] = 'fake-session' session.save() assert SessionStore(session_key=session.session_key) is not None factory = RequestFactory() request = factory.post('/login/', data) request.session = session # Create a fake session ticket and make sure it exists in the db session_ticket = SessionTicket.objects.create( session_key=session.session_key, ticket='fake-ticket') assert session_ticket is not None assert SessionTicket.objects.filter(session_key=session.session_key, ticket='fake-ticket').exists() is True user = django_user_model.objects.create(username='******', email='*****@*****.**') assert user is not None assert django_user_model.objects.filter( username='******').exists() is True request.user = user # Create a fake pgt pgt = ProxyGrantingTicket.objects.create(session_key=session.session_key, user=user, pgtiou='fake-ticket-iou', pgt='fake-ticket') assert pgt is not None assert ProxyGrantingTicket.objects.filter( session_key=session.session_key, user=user, pgtiou='fake-ticket-iou', pgt='fake-ticket').exists() is True LoginView().post(request) assert SessionTicket.objects.filter(session_key=session.session_key, ticket='fake-ticket').exists() is False assert ProxyGrantingTicket.objects.filter( session_key=session.session_key, user=user, pgtiou='fake-ticket-iou', pgt='fake-ticket').exists() is False assert SessionTicket.objects.filter(session_key=session.session_key, ticket='fake-ticket').exists() is False
def test_login_proxy_callback(monkeypatch, django_user_model, settings): """ Test the case where the login view has a pgtiou. """ # No need to test the message framework settings.CAS_PROXY_CALLBACK = True # No need to test the message framework settings.CAS_LOGIN_MSG = None # Make sure we use our backend settings.AUTHENTICATION_BACKENDS = ['django_cas_ng.backends.CASBackend'] # Json serializer was havinga hard time settings.SESSION_SERIALIZER = 'django.contrib.sessions.serializers.PickleSerializer' def mock_verify(ticket, service): return '*****@*****.**', {'ticket': ticket, 'service': service}, None monkeypatch.setattr('cas.CASClientV2.verify_ticket', mock_verify) factory = RequestFactory() request = factory.get('/login/', { 'ticket': 'fake-ticket', 'service': 'fake-service' }) # Create a session object from the middleware process_request_for_middleware(request, SessionMiddleware) # Create a user object from middleware process_request_for_middleware(request, AuthenticationMiddleware) request.session['pgtiou'] = 'fake-pgtiou' request.session.save() user = django_user_model.objects.create_user('*****@*****.**', '') assert user is not None pgt = ProxyGrantingTicket.objects.create( session_key=request.session.session_key, user=user, pgtiou='fake-pgtiou', pgt='fake-pgt') assert pgt is not None response = LoginView().get(request) assert response.status_code == 302 if django.VERSION[0] < 2: assert django_user_model.objects.get( username='******').is_authenticated() is True else: assert django_user_model.objects.get( username='******').is_authenticated is True assert ProxyGrantingTicket.objects.filter( pgtiou='fake-pgtiou').exists() is True assert ProxyGrantingTicket.objects.filter( pgtiou='fake-pgtiou').count() == 1
def test_login_no_ticket(): """ Test the case where we try to login with no ticket """ factory = RequestFactory() request = factory.get('/login/') # Create a session object from the middleware process_request_for_middleware(request, SessionMiddleware) # Create a user object from middleware process_request_for_middleware(request, AuthenticationMiddleware) response = LoginView().get(request) assert response.status_code == 302
def test_login_no_ticket_stores_explicit_next(settings): """ When there is an explicit next pointer, it gets stored in the cookie """ settings.CAS_STORE_NEXT = True factory = RequestFactory() request = factory.get('/login/', {'next': '/admin/'}) # Create a session object from the middleware process_request_for_middleware(request, SessionMiddleware) # Create a user object from middleware process_request_for_middleware(request, AuthenticationMiddleware) response = LoginView().get(request) assert response.status_code == 302 assert 'CASNEXT' in request.session assert request.session['CASNEXT'] == '/admin/'
def test_login_redirect_based_on_cookie(monkeypatch, django_user_model, settings): """ Test the case where the login view authenticates a new user and redirects them based on cookie. """ # No need to test the message framework settings.CAS_LOGIN_MSG = None # Make sure we use our backend settings.AUTHENTICATION_BACKENDS = ['django_cas_ng.backends.CASBackend'] # Json serializer was havinga hard time settings.SESSION_SERIALIZER = 'django.contrib.sessions.serializers.PickleSerializer' # Store next as cookie settings.CAS_STORE_NEXT = True def mock_verify(ticket, service): return '*****@*****.**', {'ticket': ticket, 'service': service}, None monkeypatch.setattr('cas.CASClientV2.verify_ticket', mock_verify) factory = RequestFactory() request = factory.get('/login/', { 'ticket': 'fake-ticket', 'service': 'fake-service' }) # Create a session object from the middleware process_request_for_middleware(request, SessionMiddleware) # Create a user object from middleware process_request_for_middleware(request, AuthenticationMiddleware) # Add the next pointer request.session['CASNEXT'] = '/admin/' response = LoginView().get(request) assert response.status_code == 302 assert response['Location'] == '/admin/' assert 'CASNEXT' not in request.session if django.VERSION[0] < 2: assert django_user_model.objects.get( username='******').is_authenticated() is True else: assert django_user_model.objects.get( username='******').is_authenticated is True
def test_signal_when_user_logout_slo(monkeypatch, django_user_model, settings): data = { 'logoutRequest': '<samlp:LogoutRequest ' 'xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">' '<samlp:SessionIndex>fake-ticket' '</samlp:SessionIndex></samlp:LogoutRequest>' } settings.CAS_VERSION = 'CAS_2_SAML_1_0' factory = RequestFactory() request = factory.post('/login', data) # user session and current requests.session are different request.session = {} user = django_user_model.objects.create_user('*****@*****.**', '') assert user is not None session = SessionStore() session['fake_session_key'] = 'fake-session_value' session.save() assert SessionStore(session_key=session.session_key) is not None # Create a fake session ticket and make sure it exists in the db SessionTicket.objects.create(session_key=session.session_key, ticket='fake-ticket') callback_values = {} @receiver(cas_user_logout) def callback(sender, session, **kwargs): callback_values.update(kwargs) callback_values['session'] = dict(session) LoginView().post(request) assert 'user' in callback_values assert 'session' in callback_values assert callback_values['session'].get( 'fake_session_key') == 'fake-session_value' assert 'ticket' in callback_values assert callback_values['ticket'] == 'fake-ticket'
from django.conf.urls import url from django_cas_ng.views import LoginView, LogoutView, CallbackView urlpatterns = [ url(r'^login/$', LoginView.as_view(), name='cas_ng_login'), url(r'^logout/$', LogoutView.as_view(), name='cas_ng_logout'), url(r'^callback/$', CallbackView.as_view(), name='cas_ng_proxy_callback'), ]
from django.urls import path, include from .views import * from rest_framework_jwt.views import obtain_jwt_token from django_cas_ng.views import LoginView # from .cas_wrapper import APILoginView, APILogoutView app_name = 'sso' urlpatterns = [ path('login/', LoginView.as_view(), name='login'), path('logout/', APILogoutView.as_view(), name='logout'), path('token-auth/', obtain_jwt_token), path('profile/', ProfileDashboardView.as_view(), name='profile'), path("halo/", halo, name="halo"), ]
from wagtail.contrib.sitemaps.views import sitemap from wagtail.core import urls as wagtail_urls admin.site.site_header = 'CCA Libraries Administration' admin.autodiscover() urlpatterns = [ path('django-admin/', admin.site.urls), # override Wagtail document handling — send file, not a forced download path('documents/<int:document_id>/<document_filename>', serve_wagtail_doc, name='wagtaildocs_serve'), # CAS login urls # NOTE: ^admin/logout/$ must appear before ^admin/ or it's impossible to logout path('login/', LoginView.as_view(), name='cas_ng_login'), path('admin/login/', LoginView.as_view()), path('admin/logout/', LogoutView.as_view(), name='cas_ng_logout'), path('admin/', include(wagtailadmin_urls)), # @TODO can we do this using just Wagtail REST APIs instead of Django REST framework? path('api/v2/', api_router.urls), path('api/v1/', include('alerts.urls')), path('search/', search_views.search, name='search'), path('hours/', hours_views.hours, name='hours'), # Summon "broken links" app path('brokenlinks/', brokenlinks_views.brokenlinks, name='brokenlinks'), # Serials Solution API proxy path('sersol/', sersol_views.sersol, name='sersol_api'),