def test_secondary_password_is_removed_in_logout(self): secondary_password = Random.get_random_bytes(48) secondary_password_crypt = ldap_md5_crypt.encrypt(b64encode(secondary_password)) self.ldapobj.directory[ldap_users("alice")[0]]["userPassword"].append(secondary_password_crypt) request = set_request(uri="/login", post=vars.LOGIN_ALICE, user=vars.USER_ALICE) request.session["secondary_password"] = cipher.encrypt(secondary_password) logout(request) self.assertEqual(len(ldap_users("alice", directory=self.ldapobj.directory)[1]["userPassword"]), 1)
def test_no_ldap_connection_in_logout_sends_notification_mail(self): request = set_request(uri='/login', post=vars.LOGIN_ALICE, user=vars.USER_ALICE) request.session['secondary_password'] = '******' logout(request) self.assertEqual(len(mail.outbox), 1) self.assertTrue(mail.outbox[0].subject.startswith( '%sERROR:' % settings.EMAIL_SUBJECT_PREFIX))
def test_secondary_password_is_removed_in_logout(self): secondary_password = Random.get_random_bytes(48) secondary_password_crypt = ldap_md5_crypt.encrypt( b64encode(secondary_password)) self.ldapobj.directory[ldap_users('alice')[0]]['userPassword'].append( secondary_password_crypt) request = set_request(uri='/login', post=vars.LOGIN_ALICE, user=vars.USER_ALICE) request.session['secondary_password'] = cipher.encrypt( secondary_password) logout(request) self.assertEqual( len( ldap_users( 'alice', directory=self.ldapobj.directory)[1]['userPassword']), 1)
def test_no_ldap_connection_in_logout_sends_notification_mail(self): request = set_request(uri="/login", post=vars.LOGIN_ALICE, user=vars.USER_ALICE) request.session["secondary_password"] = "******" logout(request) self.assertEqual(len(mail.outbox), 1) self.assertTrue(mail.outbox[0].subject.startswith("%sERROR:" % settings.EMAIL_SUBJECT_PREFIX))