def test_get_one_provider_data_failure(self): set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, BAD_ENTERPRISE_ID)]) self.client.force_authenticate(user=self.user) url_base = reverse('saml_provider_data-list') query_kwargs = {'enterprise_customer_uuid': BAD_ENTERPRISE_ID} url = '{}?{}'.format(url_base, urlencode(query_kwargs)) response = self.client.get(url, format='json') self.assertEqual(response.status_code, status.HTTP_404_NOT_FOUND)
def test_unauthenticated_request_is_forbidden(self): self.client.logout() urlbase = reverse('saml_provider_data-list') query_kwargs = {'enterprise_customer_uuid': ENTERPRISE_ID} url = '{}?{}'.format(urlbase, urlencode(query_kwargs)) set_jwt_cookie(self.client, self.user, [(ENTERPRISE_LEARNER_ROLE, ENTERPRISE_ID)]) response = self.client.get(url, format='json') self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN) # manually running second case as DDT is having issues. self.client.logout() set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, BAD_ENTERPRISE_ID)]) response = self.client.get(url, format='json') self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN)
def test_get_one_config_by_enterprise_uuid_not_found(self): """ GET auth/saml/v0/provider_config/?enterprise_customer_uuid=valid-but-nonexistent-uuid """ # the user must actually be authorized for this enterprise # since we are testing auth passes but association to samlproviderconfig is not found set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID_NON_EXISTENT)]) self.client.force_authenticate(user=self.user) urlbase = reverse('saml_provider_config-list') query_kwargs = {'enterprise_customer_uuid': ENTERPRISE_ID_NON_EXISTENT} url = '{}?{}'.format(urlbase, urlencode(query_kwargs)) orig_count = SAMLProviderConfig.objects.count() response = self.client.get(url, format='json') self.assertEqual(response.status_code, status.HTTP_404_NOT_FOUND) self.assertEqual(SAMLProviderConfig.objects.count(), orig_count)
def setUp(self): set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID)]) self.client.force_authenticate(user=self.user)
def setUp(self): # a cookie with roles: [{enterprise_admin_role: ent_id}] will be # needed to rbac to authorize access for this view set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID)]) self.client.force_authenticate(user=self.user)