コード例 #1
0
    def test_get_one_provider_data_failure(self):
        set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, BAD_ENTERPRISE_ID)])
        self.client.force_authenticate(user=self.user)
        url_base = reverse('saml_provider_data-list')
        query_kwargs = {'enterprise_customer_uuid': BAD_ENTERPRISE_ID}
        url = '{}?{}'.format(url_base, urlencode(query_kwargs))

        response = self.client.get(url, format='json')

        assert response.status_code == status.HTTP_404_NOT_FOUND
コード例 #2
0
    def test_unauthenticated_request_is_forbidden(self):
        self.client.logout()
        urlbase = reverse('saml_provider_config-list')
        query_kwargs = {'enterprise_customer_uuid': ENTERPRISE_ID}
        url = '{}?{}'.format(urlbase, urlencode(query_kwargs))
        set_jwt_cookie(self.client, self.user, [(ENTERPRISE_LEARNER_ROLE, ENTERPRISE_ID)])
        response = self.client.get(url, format='json')
        assert response.status_code == status.HTTP_403_FORBIDDEN

        self.client.logout()
        set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID_NON_EXISTENT)])
        response = self.client.get(url, format='json')
        assert response.status_code == status.HTTP_403_FORBIDDEN
コード例 #3
0
    def test_unauthenticated_request_is_forbidden(self):
        self.client.logout()
        urlbase = reverse('saml_provider_data-list')
        query_kwargs = {'enterprise_customer_uuid': ENTERPRISE_ID}
        url = '{}?{}'.format(urlbase, urlencode(query_kwargs))
        set_jwt_cookie(self.client, self.user, [(ENTERPRISE_LEARNER_ROLE, ENTERPRISE_ID)])
        response = self.client.get(url, format='json')
        assert response.status_code == status.HTTP_403_FORBIDDEN

        # manually running second case as DDT is having issues.
        self.client.logout()
        set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, BAD_ENTERPRISE_ID)])
        response = self.client.get(url, format='json')
        assert response.status_code == status.HTTP_403_FORBIDDEN
コード例 #4
0
    def test_get_one_config_by_enterprise_uuid_not_found(self):
        """
        GET auth/saml/v0/provider_config/?enterprise_customer_uuid=valid-but-nonexistent-uuid
        """

        # the user must actually be authorized for this enterprise
        # since we are testing auth passes but association to samlproviderconfig is not found
        set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID_NON_EXISTENT)])
        self.client.force_authenticate(user=self.user)

        urlbase = reverse('saml_provider_config-list')
        query_kwargs = {'enterprise_customer_uuid': ENTERPRISE_ID_NON_EXISTENT}
        url = '{}?{}'.format(urlbase, urlencode(query_kwargs))
        orig_count = SAMLProviderConfig.objects.count()

        response = self.client.get(url, format='json')

        assert response.status_code == status.HTTP_404_NOT_FOUND
        assert SAMLProviderConfig.objects.count() == orig_count
コード例 #5
0
 def setUp(self):
     # a cookie with roles: [{enterprise_admin_role: ent_id}] will be
     # needed to rbac to authorize access for this view
     set_jwt_cookie(self.client, self.user, [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID)])
     self.client.force_authenticate(user=self.user)
コード例 #6
0
 def setUp(self):  # pylint: disable=super-method-not-called
     set_jwt_cookie(self.client, self.user,
                    [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID)])
     self.client.force_authenticate(user=self.user)
コード例 #7
0
 def setUp(self):
     set_jwt_cookie(self.client, self.user,
                    [(ENTERPRISE_ADMIN_ROLE, ENTERPRISE_ID)])
     self.client.force_authenticate(user=self.user)